Sie sind auf Seite 1von 32

No.

675 May 16, 2011

Leashing the Surveillance State


How to Reform Patriot Act Surveillance Authorities
by Julian Sanchez

Executive Summary

Congress recently approved a temporary ex- the need to review and substantially modify the
tension of three controversial surveillance provi- statutes authorizing the Federal Bureau of In-
sions of the USA Patriot Act and successor leg- vestigation to secretly demand records, without
islation, which had previously been set to expire any prior court approval, using National Secu-
at the end of February. In the coming weeks, law- rity Letters. Though not slated to sunset with
makers have an opportunity to review the sweep- the other three Patriot provisions, NSLs were
ing expansion of domestic counter-terror pow- the focus of multiple proposed legislative re-
ers since 9/11 and, with the benefit of a decade’s forms during the 2009 reauthorization debates,
perspective, strengthen crucial civil-liberties safe- and are also addressed in at least one bill already
guards without unduly burdening legitimate in- introduced this year. Federal courts have already
telligence gathering. Two of the provisions slated held parts of the current NSL statutes unconsti-
for sunset—roving wiretap authority and the so- tutional, and the government’s own internal au-
called “Section 215” orders for the production dits have uncovered widespread, systematic mis-
of records—should be narrowed to mitigate the use of expanded NSL powers. Congress should
risk of overcollection of sensitive information resist recent Justice Department pressure to fur-
about innocent Americans. A third—authority to ther broaden the scope of NSL authority—and,
employ the broad investigative powers of the For- indeed, should significantly curtail it. In light of
eign Intelligence Surveillance Act against “lone this history of misuse, as well as the uncertain
wolf” suspects who lack ties to any foreign terror constitutional status of NSLs, a sunset should
group—does not appear to be necessary at all. be imposed along with more robust reporting
More urgent than any of these, however, is and oversight requirements.

Julian Sanchez is a Cato Institute research fellow.


The Patriot Act Letters,7 Congress held further hearings fo-
significantly Introduction cused on these powerful tools, which allow
the Federal Bureau of Investigation to de-
expanded It is nearly a decade now since Congress mand a wide array of telecommunications
government responded to the terror attacks of 9/11 by and financial records without judicial ap-
granting its hasty approval to the USA Pa- proval.8
surveillance triot Act, a sprawling piece of legislation The hearings and associated debate gen-
authorities comprising hundreds of amendments to erated both substantial press coverage9 and
with minimal an array of complex intelligence and law en- an array of substantive reform bills.10 Ulti-
forcement statutes.1 As the Washington Post mately, however, and despite a temporary
Congressional noted at the time, “members of both par- short-term extension aimed at allowing
deliberation. ties complained they had no idea what they further debate, Congress passed—and Presi-
were voting on, were fearful that aspects of dent Obama signed—a one-year reauthori-
the . . . bill went too far—yet voted for it any- zation of the expiring provisions without
way.”2 modification.11
Recognizing that Patriot had signifi- The rationale for the limited reauthori-
cantly expanded government surveillance zation was that the intervening time would
authorities with minimal deliberation, Con- be used for fruitful deliberation on needed
gress established expiration dates for 16 reforms, but that hope was not borne out.
of the Act’s most controversial provisions. Until February, there had been almost no
It similarly established a sunset for the so- further debate in Congress concerning the
called “Lone Wolf” provision of the Intelli- expiring Patriot provisions or the pressing
gence Reform and Terrorism Prevention Act need for National Security Letter reform,
of 2004, which allowed non–U.S. persons to and press attention had been correspond-
be monitored under the aegis of the Foreign ingly scant.
Intelligence Surveillance Act even if they At least some legislators, however, appear
were unaffiliated with any foreign power.3 to be growing weary of these deferrals. The
In 2005, Congress made 14 of those provi- same one-year reauthorization that easily
sions permanent, but retained sunsets for garnered the two-thirds majority required
the Lone Wolf provision, as well as Patriot for fast-track passage in 2009 fell short this
Act provisions authorizing the secretive For- year, to the surprise of many observers.12
eign Intelligence Surveillance Court to issue Instead, Congress approved an extension
warrants for “roving wiretaps” and broad of the expiring provisions for just three
orders compelling the production of busi- months, with leaders in both parties pledg-
ness records or any other “tangible thing.”4 ing that there would now—finally—be seri-
In the process, legislators added a number of ous deliberation on the need for substantive
safeguards aimed, in part, at assuaging the reform.13
concerns of civil libertarians.5 As of this writing, most of the legislative
In late 2009, as the sunset date loomed, proposals that have been advanced involve
the judiciary committees of both the House either long-term reauthorization without
and Senate held extensive hearings to con- alteration or modest amendments. Sen. Di-
sider how these new powers had been used anne Feinstein (D-CA) supports reauthori-
and what modifications to the existing stat- zation through the end of December 2013,
utes might be appropriate.6 Additionally, in along with an extension of the controversial
response to a series of increasingly damning FISA Amendments Act of 2008 to the same
reports from the Justice Department’s Office date,14 while Sen. Chuck Grassley (R-IA) is
of the Inspector General, showing large-scale seeking permanent reauthorization of the
and systematic abuse of the Patriot Act’s ex- expiring provisions.15 Sen. Patrick Leahy
panded authority to issue National Security (D-VT), meanwhile, has reintroduced the

2
relatively mild reform legislation he spon- reform. Insofar as these provisions impose
sored in 2009, which at the time was ap- heavier burdens on core privacy, speech, and
proved by a bipartisan majority of the Sen- association interests than is necessary to the
ate Judiciary Committee.16 protection of national security that should
With additional time for deliberation, be sufficient reason to seek a better balance
however, Congress should consider more regardless of where one comes down on the
far-reaching changes. With minor modifica- legal question.
tions, the roving wiretap provision can safely
be made permanent, providing greater clar-
ity and certainty to intelligence investigators. The Lone Wolf Provision
The Section 215 “tangible things” provision,
by contrast, requires additional Congressio- The extraordinary tools available to in-
nal scrutiny: it should be extended only in a vestigators under the Foreign Intelligence
narrowed form, and with further reporting Surveillance Act, passed over 30 years ago in
and auditing requirements. The Lone Wolf response to revelations of endemic executive
provision, which as of last year the Justice abuse of spying powers,18 were originally de-
Department said had never been used, can signed to cover only “agents of foreign pow-
simply be allowed to expire. (In the event ers.” The Lone Wolf provision severed that
Congress should
that consensus has not been achieved when necessary link for the first time, authoriz- nar­row the scope
the new deadline arrives, there is little reason ing FISA spying within the United States on of National
to believe their expiration would cause any any “non-U.S. person” (that is, anyone not a
near-term impediment to intelligence gath- citizen or legal permanent resident) who “en- Security Letters,
ering: all three sunsetting provisions have gages in international terrorism or activities which have
been used fairly sparingly, and are, in any in preparation therefor,” and allowing the
event, subject to a grandfather clause that statute’s definition of an “agent of a foreign
already proven
would permit their continued use for investi- power” to apply to suspects who, bluntly put, susceptible to
gations already underway.17) are not in fact agents of any foreign power. widespread
Most importantly, Congress should nar- According to a letter sent to Senator Leahy
row the scope of National Security Letters, in September of 2009 by Assistant Attorney abuse.
which have already proven susceptible to General Ronald Weich, the Lone Wolf provi-
widespread abuse, and which federal courts sion’s authority had never been invoked as of
have already found to be seriously constitu- that date, and there has been no indication
tionally defective in their current form. At that it has been used since.19
an absolute minimum, a series of procedur- As with many post-9/11 intelligence re-
al safeguards that the Justice Department forms, the Lone Wolf provision has its gen-
has already agreed to implement on a vol- esis in the misguided assumption that every
untary basis should be codified in statute. intelligence failure is evidence that investiga-
Even with these added constraints, a new tors lack sufficient surveillance authority—a
sunset for expanded NSL authorities should convenient scapegoat—while internal insti-
be established, along with mandatory audit- tutional dysfunction often bears the lion’s
ing by the Office of the Inspector General, share of the blame.20 In the aftermath of the
to ensure that they are subject to adequate attacks, it was initially alleged that FBI inves-
congressional review. tigators who had wanted to obtain a warrant
I now turn to consider each of the sun- to search the laptop of so-called “20th hijack-
setting provisions, as well as National Se- er” Zacarias Moussaoui were unable to do so
curity Letters, in detail. While many of the because FISA lacked such a Lone Wolf provi-
arguments below are framed in terms of the sion. This claim, according to the Congressio-
constitutional limits on government surveil- nal Research Service, provided the “historical
lance, they also provide policy grounds for impetus” for Lone Wolf authority.21

3
But a 2003 bipartisan report from the of prior rulings, suggesting that less strin-
Senate Judiciary Committee tells a very dif- gent limits might apply where foreign pow-
ferent story.22 It notes that on September 11, ers were concerned:
2001, investigators were able to obtain a con-
ventional warrant using the exact same evi- Further, the instant case requires
dence that had previously been considered no judgment on the scope of the
insufficient. Worse, the Committee found President’s surveillance power with
that supervisors at FBI Headquarters had respect to the activities of foreign
failed to link related reports from different powers, within or without this coun-
field offices, or to pass those reports on to try. The Attorney General’s affidavit
the lawyers tasked with determining when a in this case states that the surveillanc-
FISA warrant should be sought. Officials in es were “deemed necessary to protect
charge, the Senate report concluded, misap- the nation from attempts of domestic
plied such crucial legal standards as “prob- organizations to attack and subvert the
able cause” and falsely believed that they existing structure of Government”
could not seek a FISA order unless the spe- (emphasis supplied). There is no evi-
cific foreign terror group with which a target dence of any involvement, directly or
was affiliated could be definitively identified. indirectly, of a foreign power.25
“In performing this fairly straightforward
task,” the report concludes, “FBI headquar- The Court clearly saw the involvement of a
ters personnel failed miserably.”23 In short, foreign power as a crucial factor demarcat-
the problem was not that investigators lacked ing two constitutionally distinct realms. Pri-
Lone Wolf powers, but that they had not or to 2005, the Foreign Intelligence Surveil-
properly applied the powers they already had. lance Act tracked this distinction, enabling
Nevertheless, the new power was granted. broad surveillance—subject to the oversight
That it had not been used at the time of of a secret court, and governed by laxer re-
the last reauthorization debate suggests that strictions than apply in domestic criminal
the provision remedied no dire gap in exist- investigations—of persons demonstrated to
ing surveillance authorities, but also that be tied to foreign powers, including interna-
it has not yielded any practical harm. The tional terrorist groups.26 Absent the involve-
Lone Wolf provision does, however, threaten ment of such a foreign power, the salient
to blur the vital and traditional distinction considerations bearing on investigations of
in American law between the constraints on true lone wolves are nearly indistinguish-
strictly domestic national security investiga- able from those that apply to investigation
tions and foreign intelligence. of domestic terrorists and violent criminals.
While the Keith Court did suggest Congress
Foreign Intelligence versus Domestic might create procedures for domestic na-
The problem Security tional security investigations distinct from
was not that Courts have always extended greater those governing criminal investigations, the
deference to the executive in the realm of Lone Wolf provision simply adds an addi-
investigators foreign intelligence than in cases involving tional trigger condition to a framework oth-
lacked Lone Wolf strictly domestic security concerns. In a sem- erwise exclusively used for investigations of
powers, but that inal ruling in what has come to be known as foreign powers.
the Keith Case, a unanimous Supreme Court FISA’s definition of international terror-
they had not held that the Fourth Amendment’s warrant ism still requires some foreign “nexus” be-
properly applied requirement applied with full force to strict- fore a suspected lone wolf can be targeted,
the powers they ly domestic intelligence investigations, even but the statute provides only the vague guid-
where the national security was implicated.24 ance that its aims or methods “transcend”
already had. The Court did, however, echo the language national boundaries. Construed strictly, this

4
might be sufficient to keep the boundary non-citizens that would more properly be Remov­ing the
between foreign and domestic intelligence classified as criminal inquiries. bright-line
intact. But Justice Department officials have
suggested that the definition would cover The Broad Scope of FISA Surveillance requirement
a suspect who “self-radicalizes by means of Though the evidentiary showing needed of a link to a
information and training provided by a va- to target a person under FISA is looser than
riety of international terrorist groups via the under criminal law, the surveillance powers
foreign power
Internet,” which potentially makes a You- it affords are substantially broader. So-called may permit the
Tube clip the distinction between a domestic “Title III” wiretaps in criminal cases require FISA process to
threat and an international one.27 Activities evidence of a “nexus” between suspected
“in preparation” for terrorism, according to criminal activity and each location or com- be invoked for
the legislative history, may include the provi- munications facility monitored.31 Even then, investigations
sion of “personnel, training, funding, or oth- agents are only supposed to record conversa- that would
er means” for either a particular act of ter- tions that are pertinent to the investigation.
rorism or for a group engaged in terrorism.28 Once someone is designated as an agent more properly
The FISA definitions of an agent of a for- of a foreign power, by contrast, information be classified
eign power applicable to citizens explicitly collection is “heavily weighted toward the
require that a U.S. person targeted under the government’s need for foreign intelligence
as criminal
statute must knowingly assist a foreign pow- information,” meaning that “large amounts inquiries.
er. They also prohibit investigations con- of information are collected by automatic re-
ducted exclusively on the basis of protected cording to be minimized after the fact,” with
First Amendment activities, such as political the minimization of irrelevant information
advocacy.29 There are no such explicit limi- occurring “hours, days, or weeks after collec-
tations in the Lone Wolf provision. tion.”32 In general, FISA “permits acquisition
Moreover, while international terror- of nearly all information from a monitored
ism is defined by statute, an analysis by the facility or a searched location.”33 And as the
Syracuse University’s Transactional Records discussion of the other provisions analyzed
Access Clearinghouse, a research institution below should make clear, even casual associ-
focused on government oversight, suggests ates of a target of FISA surveillance become
that government entities apply the classifi- susceptible to acquisition of private records
cation inconsistently. Federal prosecutors detailing their activities.
decline to bring charges in a substantial ma- Even when information has been formally
jority of the terrorism cases referred for pros- minimized, it may remain, in practice, avail-
ecution by intelligence and law enforcement able to intelligence agencies. In the 2003 case
agencies, but in the recent cases where charg- U.S. v. Sattar, the FBI had reported that it had
es have been brought, more than a quarter of conducted FISA surveillance subsequent to
defendants identified as terror related by the which “approximately 5,175 pertinent voice
Justice Department’s National Security Divi- calls . . . were not minimized.” When it came
sion were not so categorized by prosecutors. time for the discovery phase of a criminal tri-
Only 8 percent of defendants appeared on all al against the FISA targets, however, the FBI
of three lists of terror-related cases indepen- “retrieved and disclosed to the defendants
dently compiled by the Justice Department, over 85,000 audio files . . . obtained through
federal prosecutors, and federal courts.30 In FISA surveillance.”34 Moreover, while targets
light of this discrepancy—and especially in of Title III surveillance are typically eventu-
the absence of the scrutiny imposed by a sun- ally informed of the eavesdropping, after the
set—there are grounds to worry that remov- investigation has finished, FISA targets are
ing the bright-line requirement of a link to a not—enhancing the secrecy of intelligence
foreign power may permit the FISA process practices, but removing a powerful check
to be invoked for investigations involving against abuses.35

5
Recommendations under the auspices of the Foreign Intelli-
In sum, any investigation authorized under gence Surveillance Act. The idea behind a
FISA will tend to sweep quite broadly, collect- roving wiretap should be familiar to fans of
ing a more substantial volume of information the acclaimed HBO series The Wire, in which
about innocent Americans than would be the drug dealers rapidly cycled through dispos-
norm under Title III wiretaps. These signifi- able “burner” cell phones to evade police
cant differences may make sense in the con- eavesdropping. A roving wiretap is used
text of spying aimed at targets who have the when a target is thought to be employing
resources of a global terror network to draw such measures to frustrate investigators, and
upon, and who will often be trained to employ allows the eavesdropper to quickly begin lis-
sophisticated countersurveillance protocols in tening on whatever new phone line or Inter-
their communications with each other. net account her quarry may be using, with-
The need for secrecy is heightened when out having to go back to a judge for a new
the target is a member of a larger group gen- warrant every time. In 2009, FBI Director
erally beyond the immediate reach of U.S. au- Robert Mueller testified that roving author-
thorities—a group that may even have some ity under FISA had been used 147 times.36
capability to infiltrate traditional law en- Roving wiretaps have existed for criminal
Serious forcement systems. The interest in continued investigations since 1986.37 There is broad
civil liberties investigation of that larger group—whether agreement, even among staunch civil lib-
concerns remain by turning or simply continuing to monitor ertarians, that similar authority should be
their agent in the United States—also means available for terror investigations conduct-
about the that intelligence investigations may not have ed under the supervision of the Foreign In-
specific statutory criminal prosecution of the target as their telligence Surveillance Court.38
goal. As a rule, these considerations simply Serious civil liberties concerns remain
language do not apply to genuine lone wolves. about the specific statutory language autho-
authorizing In the absence of the special needs cre- rizing roving intelligence wiretaps, however.
roving ated by the involvement of foreign powers, To understand why, it’s necessary to exam-
then, reliance on the more stringent provi- ine some of the broad differences between
intelligence sions of Title III should be the norm. This electronic surveillance warrants under FISA
wiretaps. should pose no problem for investigators, and the Title III wiretaps employed in crimi-
because any application meeting the stan- nal investigations.
dard for the Lone Wolf provision, if legiti- The Fourth Amendment imposes two
mately construed to cover actual terror plot- central requirements on warrants authoriz-
ters, will also meet the standards of Title III. ing government searches: “probable cause”
Because Lone Wolf authority does not yet and “particularity.”39 Under Title III, that
appear to have been invoked, it is difficult means warrant applications must connect
to gauge the appropriate level of concern the proposed surveillance to some specific
about its potential future uses. Since, how- criminal act, and must “particularly [de-
ever, it does not appear to have been neces- scribe] the place to be searched and the per-
sary in practice, and by its own terms would sons or things to be seized.” For an ordinary
only properly apply when parallel criminal non-roving wiretap, law enforcement satis-
authorities would also be available, there is fies that requirement by establishing a nexus
little good reason to leave it on the books. between evidence of a crime and a particular
place (such as a phone line, an e-mail address,
or a physical location). This will often involve
Roving Wiretaps a named target, but it need not. For example,
a warrant might be obtained to bug a loca-
Section 206 of the Patriot Act established tion known to be used for gang meetings,
authority for multipoint or roving wiretaps or a mobile phone used to discuss criminal

6
activity with another target already under anticipated speaker only “if known,”
surveillance, even if the identities of the per- Section 2518(1)(b)(iv), to satisfy the
sons making use of those facilities are not yet roving intercept statute, the person
known. The requirement of a demonstrable targeted for roving interception must
nexus to criminal activity remains, however. be identified, and only conversation
Authority to bug Tony Soprano’s office will involving the specified individual may
not entail a power to eavesdrop on his thera- be intercepted.42
py session or bug his bedroom, absent good
reason to think he’s discussing mob activity Similarly, in United States v. Petti, the Ninth
in those places. Since places and communica- Circuit wrote:
tions facilities may be used for both criminal
and innocent purposes, the officer monitor- The statute does not permit a “wide-
ing the facility is only supposed to record ranging exploratory search,” and there
what’s pertinent to the investigation. is virtually no possibility of abuse
When a roving wiretap is authorized un- or mistake. Only telephone facilities
der Title III, things necessarily work some- actually used by an identified speaker
what differently.40 For roving taps, the war- may be subjected to surveillance, and
rant application shows a nexus between the the government must use standard
suspected crime and an identified target per- minimization procedures to ensure
son rather than a particular facility. Then, as that only conversations relating to a
surveillance gets underway, the eavesdrop- crime in which the speaker is a sus-
pers can “go up” on a line once investigators pected participant are intercepted.43
have “ascertained” that the target is “proxi-
mate” to a location or communications fa- The Patriot Act’s roving wiretap provision,
cility. Perhaps in part because they require however, includes no parallel requirement
an additional showing that a traditional fa- that an individual target be named in a FISA
cilities-based wiretap is unlikely to succeed, warrant application, giving rise to concerns
these broad warrants are used relatively spar- about what have been dubbed “John Doe”
ingly: only 16 were issued in 2009 at the state warrants that specify neither a particular in-
level, and none at the federal level.41 terception facility nor a particular named
target.
Problems of Particularity An amendment in 2006 did at least add
A number of Fourth Amendment chal- the requirement that the description iden-
lenges have been raised to Title III criminal tify a specific target—which would appear to
roving wiretaps, on the grounds that a war- entail that each target must be a particular Challenges have
rant naming a target, rather than a specific individual person, rather than some inde- been raised to
place or facility, cannot meet the constitu- terminate group or class of persons satisfy-
tional particularity requirement. In rejecting ing a general characterization. But when the Title III criminal
such challenges, the courts have invariably identity of the target cannot be determined roving wiretaps
stressed that, in the modern context, the sub- conclusively, this too becomes difficult to
stitution of a named target for a named facil- guarantee. So, for example, an application
on the grounds
ity is a key feature that allows Title III multi- targeting the person residing at a particu- that a warrant
point wiretap orders to pass the particularity lar location or using a particular phone will naming a target
test. For instance, in United States v. Bianco, be indeterminate in scope if (unbeknownst
the Court of Appeals for the Second Circuit to the applicant) multiple people in fact fit cannot meet the
emphasized that: the description—rendering the communica- constitutional
tions of those other (potentially innocent)
unlike other orders under Title III, persons over multiple facilities susceptible
particularity
which requires identification of the to interception. A similar error may cause an requirement.

7
An identity— agent to follow the wrong person to a new formation are collected by automatic record-
as opposed to facility in the case of a warrant with a named ing to be minimized after the fact,” and that
target—but then, at least, the fact that there after-the-fact “minimization” may not always
a description— clearly is a wrong person enables the error to entail the destruction of the “minimized” in-
is a key to a be corrected more readily and acquisitions formation.45 Had the case discussed above
falling outside the scope of the warrant to occurred under Title III, real-time minimi-
broad universe be decisively identified. zation should have prevented recording of
of records, and A reported intelligence violation uncov- communications on the targeted line unless
thus provides ered by a Freedom of Information Act re- a known target could be positively identified
quest from the Electronic Frontier Founda- as party to the conversation.
a multidimen­ tion provides a concrete illustration of the This risk may be especially high when
sional stream of point.44 In an investigation of an apparently surveillance involves the use of sophisticat-
information that named, identified couple under FISA roving ed online filtering technology at an array of
authority, a clerical error resulted in a line unknown facilities. Such overcollection is
can be used for no longer used by the targets being included a risk even when a target is named, because
error correction. in an order renewing electronic surveillance. the global scope of the Internet increases the
Subsequently, a phone apparently used by likelihood that (for example) multiple users
a young child was monitored for five days with similar names, or who have connected
until agents realized the mistake. The error from the same IP address at different times,
was detected, in part, because technicians will hold accounts at a new facility. In the
noticed that the subjects identified in the course of a recent criminal investigation, for
warrant had previously been assigned the example, the FBI inadvertently obtained the
targeted line, but disconnected their service. full e-mail archives of an unrelated person
Knowledge of the identity of the subjects because of a typo in a warrant application.46
also gave analysts a series of expectations But the risk is greatly heightened without
about the parties to the communication, the anchor of a named target.
against which the fruits of surveillance As an illustration, consider the hypothet-
could be checked. An identity—as opposed ical (but presumably representative) wiretap
to a description—is a key to a broad universe order described at a 2009 surveillance con-
of records, and thus provides a multidimen- ference by attorney Joel M. Margolis, who
sional stream of information that can be handles government surveillance requests
used for error correction. It might become for the telecommunications company Neu-
apparent, for example, that a phone is mak- star.47 Margolis outlined the difficulties an
ing calls from one location when the target Internet service provider might face inter-
specified in the warrant is known to be else- preting an order instructing an ISP to target
where. When the target is known only by a the keyword, or virtual identifier, “RedWolf”
description sufficiently specific to enable using Deep Packet Inspection technology.48
targeting of a wiretap, robust error correc- Targeting on a virtual identifier will of-
tion is far less likely. ten be perfectly legitimate, provided there is
evidence that the person using that ID at a
The Risks of “John Doe” Warrants particular website or online service is acting
While permitting John Doe warrants as an agent of a foreign power. Indeed, in the
under Title III would be problematic for all case of a warrant naming a specific facility,
these reasons, the risk of improper overcol- “the person using the ID RedWolf might be
lection is actually far greater in the intelli- an adequately specific characterization of
gence context because, as discussed above in the target within the context of surveillance di-
the analysis of the Lone Wolf provision, FISA rected at that facility. But even when there is an
surveillance is in general far broader than its identified target, such monitoring creates an
Title III counterpart. “[L]arge amounts of in- inferential gap between the individual target

8
and the mechanism used to acquire his com- over 100 years) of audio, much of it in for-
munications. John Doe” warrants add a sec- eign languages; 1,610,091 pages of text; and
ond inferential gap. 28,795,212 electronic files, the majority
Investigators will presumably be fairly pursuant to FISA warrants. A recent audit
sophisticated about this; they are likely to of FBI backlogs by the Office of the Inspec-
understand, for instance, that evidence suf- tor General found that fully a quarter of
ficient to target RedWolf at one particular site the audio collected between 2003 and 2008
will not by itself justify acquisition on that remained unreviewed (including 6 percent
identifier elsewhere on the Internet. But the of counterterror acquisitions and 31 per-
probability of error is inevitably magnified cent of counterintelligence acquisitions, the
when a descriptive targeting mechanism is two categories covered by FISA wiretaps).51
transplanted across facilities, and especially Meaningful independent review of this vol-
when the target is unknown independently of ume of intelligence collection must, in prac-
that description. We are, as a result, far re- tice, be fairly superficial. Indeed, when the
moved from the scenario in Petti, where there target is known only by description, a mis-
was “virtually no possibility of abuse or mis- taken collection may not be immediately
take.”49 In light of the range of powerful tools obvious even after the fact.
that will already be available to investigators Other structural features of the criminal
Defenders of the
by the time probable cause is established— justice system do provide a form of de facto FISA provision
including wiretaps of specified facilities, after-the-fact oversight for electronic surveil- and other Patriot
National Security Letters, and Section 215 lance in criminal investigations. Because Ti-
orders—it should be possible to determine a tle III wiretaps aim at criminal prosecution, Act provisions
name for most targets without an unaccept- investigators must anticipate that they will almost invariably
able delay. If this is not possible, however, we be subject to a distributed form of de facto
should question whether the same tools that review by defense counsel, who have a right
neglect the
are inadequate to yield a target’s identity will to seek discovery and a powerful incentive to profound
permit that target to be reliably tracked from identify any improprieties. Even when an in- structural
facility to facility. vestigation does not result in charges being
brought, wiretap targets must be notified of differences
Why Ex Post Oversight Isn’t Enough the surveillance after the fact.52 between
Congress made some effort to address FISA surveillance, by contrast, is covert criminal and
such concerns when it reauthorized Sec- by default, and often seeks intelligence for
tion 206 in 2005, adding the aforemen- purposes other than criminal prosecution.53 intelligence law.
tioned requirement that FISA applications Even when the fruits of FISA collection are
describe a specific target. Under the revised used at trial, discovery is far more limited.54
roving statute, eavesdroppers must inform Defenders of this and other Patriot Act pro-
the FISA Court within 10 days of any new visions often assert that they only provide
facility they eavesdrop on (60 days if cause intelligence agencies the same tools avail-
for delay is shown), and explain the “facts able in criminal investigations, but almost
justifying a belief that the target is using, or invariably neglect the profound structural
is about to use, that new facility or place.”50 differences between criminal and intelli-
That is a step in the right direction, but gence law.
back-end checks and oversight are unlikely
to be an adequate substitute for front-end Recommendations
limitations on the scope of covert surveil- Because FISA surveillance is in practice
lance, and indeed, may create a false sense of subject to less robust ex post scrutiny, it is,
security. if anything, more important to constrain
Consider that in fiscal year 2008 alone, the discretion of investigators in selecting
the FBI collected 878,383 hours (or just target facilities at the acquisition stage. Ide-

9
ally, Congress should impose a requirement, Section 215 Orders
parallel to Title III, that the target of a rov-
ing wiretap be a named individual—as in all Section 215 of the Patriot Act vastly ex-
likelihood is already the case for the vast ma- panded the ability of investigators to compel
jority of the 22 roving FISA wiretaps issued, the production of sensitive records. Between
on average, each year. For the small number 1998 and 2001, FISA allowed the Foreign
of unnamed targets, the array of other FISA Intelligence Surveillance Court to issue or-
tools that would already be available—in- ders demanding records from a few specified
cluding facilities-based wiretaps and author- categories of business, provided the FISC
ity to acquire business records—should en- found there to be “specific and articulable
able identification of the target before roving facts” supporting the belief that the records
surveillance begins. With that change, FISA pertained to a “foreign power or an agent
roving authority could safely be made per- of a foreign power.”55 During that time, the
manent. business records authority was invoked only
If experience with previous roving inves- once.56
tigations suggests that greater flexibility is The Patriot Act expanded this authority
truly essential, FISA could permit a John Doe in three crucial respects. It removed the limi-
application to make the showing needed to tation on the types of businesses to which
justify roving authority, but remain limited production orders could be issued; it ex-
upon issuance to a specified set of facilities. panded the items covered by the orders from
Roving authority would be triggered only af- business records to any “tangible thing”; and
ter agents had positively identified the John perhaps most importantly, it removed any
Doe target, and made a submission to the requirement that the information sought
FISA Court of the facts supporting the con- pertain to a person suspected of involvement
clusion that the target described in the initial with terrorism or a foreign government.
order had been identified. The FISA Court These demands are subject to gag orders
would need to ratify this identification with- prohibiting the recipients from disclosing
in a relatively short period—10 days seems their existence. Unlike National Security Let-
reasonable—but without the need to approve ters, these gag orders are at least imposed
an entirely new application. With the latter by a federal judge, but their breadth and
modification, roving authority could be re- the highly deferential standard of review to
newed, but should not be made permanent which they are subject parallels language in
without a further period of review. the NSL statutes that has already been held
In either case, the Justice Department’s incompatible with the Fourth Amendment
Third-party annual FISA report to Congress should be by the U.S. Court of Appeals for the Second
required to include a tally of the number of Circuit.57 Third-party custodians of records
custodians roving orders issued each year and, if appli- would have few incentives beyond sheer
of records cable, the number of those issued without public-spiritedness to expend resources chal-
would have few a named target. To the extent possible, any lenging these orders under any circumstanc-
opinion of the FISC involving substantive es, and fewer still when the reviewing judges
incentives beyond interpretation of the scope of roving wire- are instructed to treat the mere assertion of a
sheer public- tap authority should be made available in a national security need for secrecy as “conclu-
public, redacted version. Finally, Congress sive.”58 A challenge under such a standard re-
spiritedness to should direct the Justice Department’s Of- quires a willingness to tilt at windmills with
expend resources fice of the Inspector General to conduct pe- a gold-plated lance.
chal­lenging riodic audits of roving wiretap orders and The initial wording of Section 215 re-
prepare reports on their use, which should quired only that the records be sought for a
Section 215 be redacted as necessary to permit public foreign-intelligence investigation. Congress
orders. release. subsequently raised this standard, requiring

10
a recitation of facts providing “reasonable How Protected are Third-Party Records? The relevancy
grounds to believe” that the information is During the initial debate over the Patriot standard permits
relevant to an authorized investigation to Act, Senator Leahy justified the expansion of
protect against terrorism or an intelligence Section 215 on the grounds that “the Fourth acquisition
investigation whose target is not a U.S. per- Amendment does not normally apply to of sensitive
son.59 This is “an undemanding standard such techniques and the FBI has comparable
that requires the government to show that authority in its criminal investigations.”64
information
the tangible things may have a bearing on Supporters of the provision, since the Act’s about
or produce information probative of the passage, have routinely invoked similar com- Americans with
investigation.”60 But the FISC is further re- parisons to such tools as administrative- or
quired to find that records are presumptively grand-jury subpoenas, despite significant no connection
relevant on a showing that they pertain to differences between these authorities.65 to terrorism.
an agent of a foreign power, a person in con- While a detailed analysis of the third-
tact with an agent of a foreign power, or the party doctrine is beyond the scope of this
activities of such an agent.61 paper, it bears noting that it has long been
In the modern context, that standard the subject of blistering criticism by legal
permits the acquisition of a wide array of scholars, especially as technological change
sensitive information about an enormous has increased the quantity of personal in-
number of Americans with no connection formation about each of us held by third
to terrorism, on the basis of the most tenu- parties.66 One of its lonely defenders in the
ous connection to any actual suspect. “When academy has characterized it as “the Fourth
combined with the broad sweep of the three Amendment rule scholars love to hate. . . .
areas in which a tangible-things order is the Lochner of search and seizure law, widely
presumptively relevant,” according to the criticized as profoundly misguided.”67 Nu-
manual coauthored by the former head of merous state supreme courts have rejected
the Justice Department’s National Security it, in whole or in part, under state consti-
Division, “FISA appears to allow the govern- tutional provisions parallel to the Fourth
ment to obtain a tangible-things order with a Amendment.68
minimal showing that the items it seeks are If we stipulate the general validity of the
connected to the activities of a foreign power third-party doctrine for the sake of argu-
or agent of a foreign power.” This might in- ment, however, it is worth noting that it has
clude, for example, “the bank records of the traditionally been applied precisely to records,
grade school teacher of the child of a person retained by firms whose employees have ac-
who is suspected of being an agent of a for- cess to them for ordinary business purposes.
eign power.”62 It is not a blanket Fourth Amendment excep-
Like National Security Letters—which are tion for any item in the possession of a third
issued entirely without advance judicial ap- party. The exception does not, for instance,
proval—Section 215 orders need not be sup- extend to the contents of rented storage
ported by the individualized suspicion or lockers.69 A recent appellate ruling has simi-
finding of probable cause normally required larly suggested that it does not apply to the
for a Fourth Amendment search. In both contents of remotely stored e-mail, which a
cases, the legal theory underpinning such a 25-year-old federal statute had hitherto per-
procedure is the so-called “third-party doc- mitted to be obtained without a probable-
trine,” which rests on the dubious proposi- cause warrant in many circumstances.70
tion that persons normally waive their “rea- Even within the category of records, ap-
sonable expectation of privacy” when they pellate courts have begun indicating that
provide documents to third parties, even the third-party doctrine will not always ap-
when those parties are contractually or stat- ply. The Third Circuit recently held that lo-
utorily bound to confidentiality.63 cation records held by mobile phone provid-

11
ers do enjoy Fourth Amendment protection, tion 215—the Justice Department was at
in part because “[a] cell phone customer has least initially relatively circumspect in its use
not ‘voluntarily’ shared his location infor- of this authority, limiting itself to seeking
mation with a cellular provider in any mean- actual business records during the period
ingful way.”71 A parallel argument could covered by the Inspector General’s audits.75
easily be made for much of the transactional Indeed, expanded Section 215 authority was
information, or metadata, generated by on- not used at all for two years after the passage
line activity and collected by websites or ser- of the Patriot Act, and appears to have been
vice providers.72 As these cases should make used relatively sparingly since then.76 More-
clear, courts are still in the early very stages over, the FISC appears to be fairly active in
of grappling with the proper application of keeping the scope of Section 215 orders nar-
the Fourth Amendment to the Internet era. row: of the 21 sought in 2009, for example,
Moreover, there are a range of distinct the Court made modifications to 9 of the
First Amendment interests implicated by orders.77
government access to online transactional There are, nevertheless, several reasons
data and other records that may reveal ex- for concern. First, the relatively sparing use
pressive activity, which are explored in great- that has been made of Section 215 may is
There are a er detail in the section dealing with National attributable in large measure to the extraor-
range of First Security Letters below.73 In brief: numerous dinary breadth of post–Patriot National Se-
Amendment courts have found that heightened scrutiny curity Letters, which make a wide array of
is necessary when the compulsory produc- the most useful records available to inves-
interests tion of records would burden the right to tigators without the need for a court order.
implicated by speak, read, or associate anonymously. Judg- FBI agents interviewed by the Office of the
es reviewing applications under Section 215 Inspector General have made it clear that,
government may, of course, take such considerations into in light of the substantial delays associated
access to online account sua sponte, but with respect to covert with Section 215 orders,78 they are regard-
transactional national security investigations, recipients ed as a tool of “last resort,” employed only
of these orders will typically have neither the when National Security Letters or other au-
data and other incentive nor—just as crucially—the informa- thorities are unavailable.79 Indeed, the first
records that may tion necessary to mount an effective chal- uses of the authority appear to have been
reveal ex­pressive lenge on these grounds when appropriate. motivated primarily by a desire to justify its
Language in the amended Section 215 existence to legislators: as a Justice Depart-
activity. does explicitly limit the scope of orders to ment attorney explained to the Office of the
items that could be obtained via grand-jury Inspector General, by the summer of 2003,
subpoena or similar compulsory process.74 “there was a recognition that the FBI needed
But the secrecy surrounding the orders, to begin obtaining Section 215 orders be-
coupled with the broad scope of “tangible cause . . . Congress would be scrutinizing the
things” authority, invites uses that push the FBI’s use of the authority in determining
boundaries of the already overbroad Fourth whether to renew the authority.”80
Amendment loophole upon which this au- Should NSL authority be narrowed along
thority is premised, even as courts begin the lines recommended below, however, it is
moving to clarify and narrow it. Secret pro- highly probable that a sharp increase in the
ceedings before the FISC are, to put it mildly, use of Section 215 would ensue. This would
not the ideal forum to test the outer limits of be an unambiguous improvement, insofar
an evolving area of law. as it substituted judicial authority for agen-
cy fiat in compelling the production of re-
Section 215 in Practice cords, but could lead to attenuated scrutiny
Fortunately—and owing in part to the unless adequate resources are allocated to
substantial controversy surrounding Sec- the application-review process.

12
Second, the Justice Department’s rela- [T]he real reason for resisting this obvi-
tively conservative approach to Section 215 ous, common-sense modification of
appears to be, at least in part, a function of Section 215 is unfortunately cloaked
the scrutiny associated with the authority’s in secrecy. Some day that cloak will
sunset. In popular discourse, the provision be lifted, and future generations will
has often been referred to as the “library whether ask our actions today meet
provision” because it has generated strong the test of a democratic society: trans-
opposition from librarians chary of govern- parency, accountability, and fidelity to
ment inquiries into their patrons’ reading the rule of law and our Constitution.85
habits.81 In at least one case, investigators
seeking production of library records were The most troubling and direct statement on
told that a “supervisor would not permit the subject came from former senator Russ
the request to go forward because of the po- Feingold (D-WI), then a member of both the
litical controversy surrounding 215 requests Intelligence and Judiciary Committees, who
for information from libraries.”82 That reti- asserted that he had become aware of spe-
cence could easily diminish were the provi- cific abuses of Section 215 unknown to the
sion made permanent. general public and, indeed, to most mem-
Finally—and perhaps most worryingly— bers of Congress:
testimony from Justice Department offi-
cials during the 2009 reauthorization de- I recall during the debate in 2005 that
bate revealed that Section 215 “supports proponents of Section 215 argued
an important sensitive collection program” that these authorities have never been
about which a few select legislators had misused. They cannot make that state-
been briefed.83 The heavily redacted public ment now; they have been misused. I can-
versions of reports from the Office of the not elaborate here, but I recommend
Inspector General do not discuss uses of that my colleagues seek more informa-
Section 215 connected with this program, tion in a classified setting. [Emphasis
which in any event appears to postdate the added.]86
audit period. Lawmakers familiar with the
program, however, have suggested that cru- In short, while the limited public reporting
cial “information about the use of Section on the use of Section 215 indicates that it
215 orders that . . . Congress and the Ameri- was used relatively conservatively through
can people deserve to know” is absent from 2006, there are ample grounds for concern
the public debate.84 that the provision’s broad language permits
In 2005, legislative language narrowing far more sweeping information collection
Section 215 authority to require a factual about innocent Americans—and, indeed,
showing that records being sought pertain there are hints that steps in this direction
to terrorists and spies, or their associates, may have already been taken. Former senator
had been approved unanimously by both Russ Feingold
the Senate Judiciary Committee and the Recommendations
full Senate, but was ultimately removed Notwithstanding these concerns, greater (D-WI) asserted
from the reauthorization bill signed by future reliance on a properly circumscribed that he had
the president. When a similar reform was Section 215—as a substitute, in many cases,
rejected in 2009, apparently as a result of for National Security Letters, which lack
become aware of
a classified briefing in which intelligence adequate judicial supervision—would con- spe­cific abuses
officials alleged that such a modification stitute a significant improvement from a of Section 215
would interfere with this “sensitive collec- civil liberties perspective, and the Justice
tion program,” Sen. Richard Durbin (D-IL) Department and FISC should be allocated unknown to the
complained: such resources as may be necessary to render general public.

13
Section 215 this feasible. In order to effectively play this agent, or to the activities of such a person
should be role, Section 215 authority that is somewhat or group when this is the least intrusive
more expansive than what existed under the available means of identifying the persons
tightened so pre–Patriot Act FISA may be appropriate. To involved in those activities.89
as to foreclose compensate for the heightened risks to civil This dual requirement would give FISC
liberties inherent in covert intelligence gath- judges a clearer basis for evaluating the evi-
the possibility ering, however, the scope of Section 215 or- dentiary showing in Section 215 applica-
of fishing ders and the standard of review FISC judges tions, and ensure that something beyond
expeditions apply to them should be tightened so as to mere casual contact with a suspect justifies
foreclose the possibility of fishing expedi- acquisition of Americans’ sensitive records.
through the tions through the sensitive records of inno- At the same time, the relative laxity of the
sensitive records cent Americans only tenuously connected to relevance standard ensures that agents are
of inno­cent terror suspects. not burdened with too high an evidentiary
First, in light of the evolving state of ju- bar in the exploratory phases of an inves-
Americans. risprudence concerning data entrusted to tigation. On the basis of the limited infor-
third parties, Section 215 authority should mation available in the inspector general’s
be explicitly restricted to business records public reports, it appears highly probable
whose subjects lack a Fourth Amendment that most—if not all—of the Section 215 or-
expectation of privacy in their contents. This ders issued between 2003 and 2006 would
would clarify that Section 215 does not ap- already meet this standard. Where there is
ply, for example, to private documents held a compelling argument for broader routine
by cloud-based storage systems, or to the in- access to specific types of records, and such
creasingly precise and detailed information access would have minimal effect on speech
about a person’s day-to-day physical move- or privacy interests, Congress may wish to
ments that may be derivable from mobile- consider more narrowly tailored legislation,
device records. It would also recognize ex- along the lines of the rules governing impor-
plicitly that courts continue to grapple with tation or sale of certain precursor chemicals
the question of how far citizens’ “reasonable for narcotics or explosives.
expectation of privacy” extends to other re- Finally, the process for challenging Sec-
cords created by third-party information tion 215 gag orders should be explicitly al-
processing, but not normally subject to hu- tered to comport with the Second Circuit’s
man review.87 FISA’s physical search and ruling in Doe v. Mukasey, which held that a
electronic surveillance authorities, subject parallel review process in the National Se-
to a probable-cause standard, would remain curity Letter statutes failed to adequately
available for protected records and other respect the First Amendment interests of
tangible things. recipients.90 That standard requires recipi-
Second, the presumption of relevance ents to wait a full year before challenging
for certain categories of records—which the a nondisclosure order, burdens them with
attorney general has previously indicated establishing that there is “no reason” to
the Justice Department does not require— believe disclosure “may” interfere with any
should be repealed.88 Instead, applications investigation or harm national security, and
for a Section 215 order should be required requires judges to treat certification by a
to cite specific and articulable facts demon- high-ranking Justice Department official as
strating that the records sought are both rel- “conclusive” on that question.91
evant to an investigation and fall under one The required one-year delay should be re-
of three categories: records pertaining to a moved, and the burden of establishing some
suspected agent of a foreign power who is realistic likelihood of an identifiable harm
the subject of an authorized investigation, shifted to the government. FISC judges will
to persons in contact with such suspected naturally—and appropriately—extend sub-

14
stantial deference to the government’s as- fold increase over historic norms.”94 Perhaps
sessment of such risks, but the “fiat of a unsurprisingly, the expanded authority has
governmental official, though senior in rank already been subject to what the inspector
and doubtless honorable in the execution of general called “widespread and serious mis-
official duties, cannot displace the judicial use.”95
obligation to enforce constitutional require- NSLs have their origin in an exemption
ments.”92 Nondisclosure orders should be from federal privacy statutes created in the
narrowly tailored and, whenever possible, late 1970s, which permitted the voluntary
time limited to ensure recipients’ speech disclosure of otherwise protected financial
rights are not constrained past the point nec- records when they concerned a suspected
essary to protect national security. Similarly, foreign spy. They have evolved over time
the one-year delay imposed on challenges to into a set of extraordinarily broad compul-
the underlying orders—which denies recipi- sory tools akin to administrative subpoenas.
ents access to judicial review until long after NSLs now permit the FBI and certain other
the production of records—should also be re- agencies to demand detailed financial re-
moved. cords, consumer credit reports, and telecom-
While Section 215 could, in all likeli- munications transactional records without
hood, be made permanent if modified along judicial authorization.96 While there are cur-
National
these lines, it would be prudent to establish rently five distinct NSL authorities, spread Security Letters
at least one additional sunset period to en- across four federal statutes, this paper will have emerged as
able the Office of the Inspector General to focus on the two types used exclusively by
audit the use of the amended authority—es- the FBI that account for the overwhelming perhaps the most
pecially given that modifications to the Na- majority of NSLs issued. controversial
tional Security Letter statutes may substan- NSLs under the Right to Financial Priva-
tially increase reliance on Section 215. If, as cy Act97 are used to compel the production
surveillance
its proponents assert, this provision is not of records from “financial institutions,” a tool augmented
being used to engage in overbroad “fishing statutorily defined category now encompass- by the Patriot
expeditions,” these common-sense limita- ing a wide array of entities that, in the words
tions should have a minimal practical effect of former Assistant Attorney General David Act with good
on legitimate investigations. Kris, “would not ordinarily be considered reason.
financial institutions.”98 NSLs under the
Electronic Communications Privacy Act99
National Security Letters are used to obtain telephone and Internet
transaction records. They may be served on
National Security Letters—once all but un- traditional telecommunications firms and
known to the general public—have emerged Internet service providers, but also any other
as perhaps the most controversial surveil- online service that gives users “the ability to
lance tool augmented by the Patriot Act and send messages or communications to third
its successors, and with good reason.93 This parties”—such as Facebook, Gmail, or AOL
previously narrowly limited power was trans- Instant Messenger.100 The precise range of re-
formed into a sweeping mechanism enabling cords that can be obtained with ECPA NSLs
the FBI to acquire, without advance judicial is currently contested, but the FBI has tradi-
approval, a wide array of sensitive informa- tionally asserted the right to demand—and
tion about Americans who are not even sus- has apparently received—almost anything
pected of any connection with terrorism. As short of actual communications content.101
with Section 215 orders, the recipients are The language of the statute refers to “toll
barred from disclosing the request. The en- records”—traditionally meaning records of
suing explosion of NSLs has been character- telephone numbers dialed and received—but
ized by government officials as a “hundred- in the modern era is generally understood

15
to encompass Web IP addresses visited and on traditional financial institutions, such as
e-mail sender and recipient addresses, at the banks and credit card companies, but also:
very least.
The Patriot Act and subsequent intelli- insurance companies, pawnbrokers,
gence legislation vastly expanded these au- dealers in precious stones or jewels,
thorities along multiple dimensions. The travel agencies, telegraph companies,
most significant is the removal of any re- licensed money transfer companies,
quirement of a link to a suspected foreign automobile dealers, real estate closing
power. Previously, NSLs applied only the re- companies, casinos, the Post Office,
cords of persons suspected, on the basis of government agencies involved in finan-
“specific and articulable facts,” of being for- cial transactions, and any other busi-
eign spies (or to their contacts, if only basic ness “whose cash transactions have a
subscriber information was sought).102 In high degree of usefulness in criminal,
their current form, NSLs need only certify tax, or regulatory matters.”107
that the records sought are relevant to an
authorized investigation, according to the RFPA NSLs, therefore, now cover “almost
FBI’s own determination. any record” in the custody of “virtually any
As the Justice Department itself explains, commercial or government entity that han-
this “minimal evidentiary predicate . . . means dles cash transactions with customers.”108
that the FBI—and other law enforcement or
Intelligence Community agencies with access The Explosive Growth of Post-Patriot
to FBI databases—is able to review and store NSLs
information about American citizens and Three extensive reports from the Office
others in the United States who are not sub- of the Inspector General show that the dra-
jects of FBI foreign counterintelligence in- matic expansion of these authorities has
vestigations and about whom the FBI has no led to an equally dramatic increase in their
individualized suspicion of illegal activity.”103 use.109 While no reliable data exists for 2001–
While the more limited pre-Patriot authority 2002, the OIG counted nearly 200,000 NSL
required direct approval by a high-ranking requests issued by the FBI from 2003–2006,
official at FBI headquarters, power to issue with more than 56,000 issued in a single
NSLs has now been delegated to the Special year—up from the 8,500 issued in 2000.110 As
Agents in Charge of all 56 FBI field offices.104 the OIG notes, however, poor recordkeeping
Even the weak limitation of a required and reporting in the early years mean that
connection to an authorized investigation is the true figure is almost certainly substan-
ultimately subject to executive branch discre- tially higher.111
tion: two years after the passage of the Patriot Moreover, the proportion of those re-
Act, the Attorney General’s guidelines for na- quests pertaining to U.S. persons has risen
The problem was tional security investigations were revised to sharply over time. In 2003, roughly 39 per-
not inadequate permit “preliminary” inquiries—which the cent of NSL requests were related to inves-
FBI acknowledges are subject to “no particu- tigations of citizens or legal residents. By
information lar standard of proof”—to count as “autho- 2006, that figure had risen to 57 percent—
collection, but rized investigations.”105 Though previously meaning a total of 11,517 Americans had
inadequate restricted to full investigations, nearly half of their records scrutinized pursuant to NSL
the NSL requests in the years following the authorities.112
sharing and guideline change were issued in connection The figures calculated by the OIG are not
analysis of with preliminary inquiries.106 strictly comparable to those reported to Con-
Later amendments also dramatically ex- gress by the Department of Justice each year,
information panded the scope of NSLs for financial re- which include only NSL requests pertaining
already collected. cords, allowing them to be served not only to U.S. persons, and (perhaps more signifi-

16
cantly) exclude requests for basic subscriber tential suspects. As Michael Woods, a former Investigative
information under ECPA’s NSL authority. senior FBI attorney has explained, reflecting efforts are
Despite these limitations, more recent re- on the post-9/11 climate at the Bureau:
ports suggest that the FBI continues to rely expanding, with
heavily on NSLs. In 2009, the most recent All of a sudden, every lead needed to be easier access to
year for which reported figures are available, looked at. The atmosphere was such
the FBI issued 14,788 NSL requests for infor- that you didn’t want to be the guy
records enabling
mation about 6,114 U.S. persons (again, not who overlooked the next Moussaoui. a larger number
counting requests for basic subscriber infor- . . . If you’re telling the FBI people of investigations
mation).113 over and over you need to be preemp-
The vast majority of those Americans tive, you need to get out there before to be pursued
are almost certainly not even suspected of something happens, you’re pushing with a lower
involvement in espionage or terrorism. As people toward a fishing expedition. threshold of
then assistant attorney general David Kris We heard over and over again, connect
explained in 2009, NSLs are used to “sweep the dots, and we were pushing the suspicion.
more broadly than just the individual who envelope and doing things that, in the
may end up being the defendant or identi- old days, would have seemed beyond
fied as a terrorist precisely because [inves- the pale.119
tigators] are trying to develop the case.”114
NSLs are often used to map a “community This makes sense, however, only if the inabil-
of interest” based on an initial suspect’s “call- ity to exhaustively pursue a large number of
ing circle,” a process that may entail gather- lower-threshold leads is a significant cause of
ing information about persons “two or three intelligence failure. But there is little evidence
steps removed” from the target.115 Often for this proposition. Several perpetrators of
FBI officials who signed off on boilerplate the 9/11 terror attacks—notably Khalid al-
NSL language seeking broad “community of Midhar and Nawaf al-Hazmi—were known
interest” data “were not even aware that they al Qaeda associates who had been moni-
were making such requests.”116 As the OIG tored by the Central Intelligence Agency well
noted, given the statutory requirement that before they entered the United States. The
records be obtained via NSL only following a failure to detect and disrupt that plot, then,
determination of relevance by designated of- cannot be attributed to an excessively high
ficials, this practice “violated the ECPA, the threshold for following up leads: those indi-
Attorney General’s NSI Guidelines, and FBI viduals plainly met any reasonable threshold
policy.”117 for investigation, and indeed, could clearly
have been extensively monitored pursuant to
More Letters, Diminishing Returns pre-Patriot authorities. As in the case of Zac-
Agents interviewed by the OIG have gen- arias Moussaoui, the problem was not inad-
erally indicated that they find NSLs highly equate information collection, but inadequate
useful—but as with Section 215 orders, sharing and analysis of information already
much of this usefulness consists in generat- collected.120 Other provisions of the Patriot
ing new leads and then eliminating the prob- Act and subsequent legislation have properly
able dead ends.118 While this is, of course, an aimed to remedy some of these structural
important goal, the ease of NSL information (and, indeed, cultural) problems—but it is far
gathering may also lower the threshold for less clear that a paucity of raw data prior to
which leads are worth pursuing. It may even the expansion of NSL authority was a genu-
create a vicious cycle, where gathering more ine problem requiring a solution.
information generates more leads, requiring Any tool used as frequently as NSLs will, of
that still more information be collected in course, retrospectively be seen to have played
order to shrink the ballooning pool of po- a role in some successful investigations. But

17
this is a poor metric of their general utility, sued with a lower threshold of suspicion. If
especially when their primary function is pre- it is argued that NSLs are necessary to quick-
liminary filtering of large numbers of people ly sort through large numbers of ultimately
to identify individuals—such as terrorists— unproductive leads, we should at least insist
with extremely low frequency in the popu- on evidence that there is some measurable
lation. We do not normally test the general benefit to opening so many investigations in
public for very rare diseases, because even a the first place. It is telling, as the American
very accurate test will tend to produce an un- Civil Liberties Union notes, that “every time
acceptably high number of false positives for an NSL recipient has challenged an NSL in
each accurate diagnosis.121 In intelligence no court, the government has ultimately with-
less than in epidemiology, the proper policy drawn its demand for records”—a pattern
question is not whether any particular tool that is extremely difficult to reconcile with
generates some data that is useful in a suc- claims that those demands are essential to
cessful investigation, but whether it provides safeguard against terror attacks.125
enough necessary information at the mar- After investigations are closed—and re-
gin—information that could not have been gardless of whether they result in prosecu-
obtained using (for example) a combination tion, or any grounds for suspicion that the
Records were of narrower, pre-Patriot NSLs and judicially persons whose records have been obtained
improperly authorized Section 215 orders—to justify the are guilty of anything—“once information is
obtained on costs of diminished privacy and resources ex- obtained in response to a national security
pended chasing false positives. On the basis letter, it is indefinitely retained and retriev-
reporters for of these very considerations, an independent able by the many authorized personnel who
the Washington review by an expert panel of the National have access to various FBI databases.”126
Research Council has cautioned against reli- Some 13,000 users, within both the FBI and
Post and the New ance on predictive data mining in the War on other government agencies, have access to
York Times—in Terror.122 the billions of records contained in one of
violation of Though it is difficult to say definitively the most extensive databases, the Investiga-
without access to classified records, publicly tive Data Warehouse.127 As recent large-scale
both the law available data provides some reason to believe releases of classified documents by the whis-
and internal we have passed the point of diminishing re- tleblowing website WikiLeaks have shown, a
regulations. turns. Of the fraction of FBI terror investiga- single user in the digital era—whether acting
tions ultimately referred to U.S. attorneys in from misguided idealism or more sinister
2001, immediately after the 9/11 attacks, 66 motives—may be able to extract enormous
percent resulted in prosecutions in 2002. By quantities of sensitive information, even
2009, the number had fallen to 21 percent— from putatively secure databases.128
meaning federal prosecutors were declin-
ing to pursue nearly 80 percent of the cases A History of “Widespread and Serious
referred to them by the FBI.123 The average Misuse”
prison sentence for international terrorism Already, these sweeping authorities have
prosecutions resulting in convictions fell been subject to widespread misuse. A review
from 40 months in 2004 to 5 months in 2006, by the Electronic Frontier Foundation of
suggesting that the great majority involved of- some 800 violations of the law or internal
fenses substantially less serious than planned guidelines reported to the Intelligence Over-
attacks on Americans.124 sight Board from 2001–2006 found that
In short, it seems at least plausible that nearly a third involved National Security Let-
investigative efforts are expanding to fill the ters.129 Still more troubling, a small sample
available space created by enhanced author- of case files reviewed by the OIG found that
ities, with easier access to records enabling 22 percent contained potential violations
a larger number of investigations to be pur- that had never been reported, many involv-

18
ing the acquisition and retention of records tions providers, but agents refused to use
beyond the legitimate scope of the NSL.130 the new system “because they did not want
Perhaps the most disturbing violations of the responsibility for inputting the data.”138
the rules governing surveillance powers in- While it is conceivable that this reluctance
volve the use of so-called “exigent letters” and stemmed from an extreme aversion to cleri-
informal requests for telecommunications cal work, it may also indicate that at least
data to bypass the NSL approval and over- some of them may have had doubts about
sight process. Between 2003 and 2006, agents the legality of the prevailing practices. It is
in the FBI’s Communications Analysis Unit similarly telling that when information ob-
issued 722 of these exigent letters to obtain tained by these extralegal means was later
data from providers without appropriate le- cited in the small sample of warrant applica-
gal process, often indicating that an NSL or tions to the secret Foreign Intelligence Sur-
subpoena would be provided later.131 While veillance Court reviewed by OIG, “FBI per-
ECPA does contain a provision covering dis- sonnel filed inaccurate sworn declarations
closure in genuine emergencies, as when an with the FISA Court to the effect that the
attack is believed to be imminent, that excep- subscriber or calling activity information
tion was not invoked in these instances, and was obtained in response to NSLs or a grand
would have applied to only a tiny fraction of jury subpoena, when in fact the informa-
the putatively exigent cases.132 Among those tion was obtained by other means, such as
whose records were improperly obtained exigent letters.”139 Again, while it is possible
were reporters for the Washington Post and the to ascribe these false statements to innocent
New York Times—in violation of both the law error, they are also consistent with a desire
and internal regulations requiring that the to avoid FISC scrutiny of the use of exigent
attorney general approve such requests.133 letters and informal requests.
Still more incredibly, investigators sought
records pertaining to more than 3,500 tele- The Nature of Intelligence Abuses
phone numbers without any process at all, While the use of exigent letters was finally
simply requesting records “verbally during formally barred in 2007, it seems clear that
telephone calls or visits to the providers’ the broad and discretionary nature of NSL
Communications Analysis Unit work sta- authority was a key factor in allowing the
tions, or on pieces of paper, such as Post-it practice to continue for several years—well
notes.”134 after supervisors and Department of Justice
FBI officials would later attempt to cover attorneys became aware of it. While presum-
these improprieties after the fact by issuing ably this particular form of abuse is not now
blanket NSLs covering hundreds of phone likely to continue, its scale and persistence
numbers.135 But at least 266 phone numbers confirms the general tendency for admirably
for which records were improperly acquired dedicated investigators, precisely as a func-
“were related to criminal investigations or tion of their dedication, to stretch the limits It would be
domestic terrorism investigations for which of their authority when unchecked by a neu-
NSLs are not an authorized technique un- tral and detached magistrate. It demands
troubling if the
der the ECPA NSL statute, the Attorney too much to expect agents properly focused authority to
General’s NSI Guidelines, or FBI policy.”136 on what is expedient in a specific investiga- acquire records
When the OIG interviewed the personnel tion to simultaneously balance their needs
responsible for these practices, it found that against the aggregate interest in preserving a were simply
“no one could satisfactorily explain their general system of liberties and privacy pro- broadened so
actions,” instead offering only “a variety of tections.
unpersuasive excuses.”137 Supervisors had, Indeed, from a systemic perspective, ex-
far that almost
at one point, attempted to implement a da- cessive focus on particular “abuses” may be nothing counted
tabase to track requests to telecommunica- something of a red herring. It would, after as an abuse.

19
National Security all, be far more troubling if the authority harassed and disrupted because of
Letters permit to acquire records were simply broadened their political views and their life-
so far that almost nothing counted as an styles. Investigations have been based
the collection abuse. The real issue is that even if used pre- upon vague standards whose breadth
and retention cisely as intended, NSLs permit the collec- made excessive collection inevitable.
tion and retention of an enormous amount Unsavory and vicious tactics have been
of an enormous of sensitive information about innocent employed—including anonymous at-
amount of Americans for the most part. tempts to break up marriages, dis-
sensitive The history of intelligence abuses in the rupt meetings, ostracize persons from
United States suggests that the existence of their professions, and provoke target
information such large databases in itself increases the groups into rivalries that might result
about innocent risk of abuse, even if the initial collection in deaths. Intelligence agencies have
Americans for itself is consistent with the letter of the law. served the political and personal objec-
While our system of checks and balances is tives of presidents and other high offi-
the most part designed to exclude improperly obtained in- cials. While the agencies often com-
innocent. formation at trial, historical abuses of intelli- mitted excesses in response to pressure
gence surveillance have more often involved from high officials in the Executive
the extralegal use of information to intimi- branch and Congress, they also occa-
date or harass political dissidents, journal- sionally initiated improper activities
ists, and even judges and legislators.140 As and then concealed them from officials
the Senate committee headed by Sen. Frank whom they had a duty to inform.141
Church summarized the results of its inten-
sive investigation in the 1970s: In many cases—although not all—the initial
monitoring of domestic targets was itself
Too many people have been spied upon improper, and there has been an under-
by too many Government agencies standable tendency to see this as the sine qua
and too much information has been non of abuse. But in a 21st- century techno-
collected. The Government has often logical context, an enormous quantity of
undertaken the secret surveillance of information about group political activities,
citizens on the basis of their political which previously would have been obtain-
beliefs, even when those beliefs posed able only via targeted direct surveillance,
no threat of violence or illegal acts may be derivable by means of sophisticated
on behalf of a hostile foreign power. analysis of telecommunications metadata
The Government, operating primarily swept up in the course of facially legitimate
through secret informants, but also investigations. Under rules that permit the
using other intrusive techniques such sweeping collection of such data—especially
as wiretaps, microphone “bugs,” sur- if dead-end leads are both numerous and
reptitious mail opening, and break- disproportionately concern unpopular (but
ins, has swept in vast amounts of nonviolent) political and religious groups—
information about the personal lives, the potential for inappropriate future use of
views, and associations of American information will not necessarily be linked
citizens. Investigations of groups with improper intent at the acquisition
deemed potentially dangerous—and stage. Minimization rules limiting retention
even of groups suspected of associat- and dissemination of data—which should be
ing with potentially dangerous organi- strengthened—can mitigate this risk to some
zations—have continued for decades, extent. But harms of this type are inherently
despite the fact that those groups did difficult to detect, and the mere existence of
not engage in unlawful activity. such massive databases has the potential to
Groups and individuals have been chill protected political activity.

20
Just Another Subpoena? nitely bound from disclosing even their
Like Section 215 orders, National Secu- existence to the general public. The details
rity Letters are routinely defended on the of their use typically remain shrouded, not
grounds that they only grant intelligence merely for the duration of a specific inves-
investigators “the same” authority that is tigation, but effectively forever. This not
available to criminal investigators via such only removes one important kind of check
mechanisms as administrative or grand-jury on the agents using the authority, but also
subpoenas.142 Even in the criminal context, importantly alters the incentives facing the
it bears noting that the routine investiga- recipients of demands for information.
tive use of third-party document subpoe- A comparison with the recent case of Gon-
nas is a late 20th-century development that zales v. Google is instructive here.147 The In-
has occasioned fierce criticism from Fourth ternet search-giant Google moved to quash
Amendment scholars.143 But these analo- a subpoena seeking a sample of user search
gies also typically elide a number of impor- queries, which the government hoped would
tant and fundamental differences between be relevant to its defense of the controversial
NSLs and the subpoenas typically used in Child Online Protection Act against a chal-
criminal investigations. lenge by the American Civil Liberties Union.
While the grand jury, as it exists today, is The company made clear that a primary ba-
The potential for
often subordinate to prosecutors in practice, sis for its challenge was the fear of losing us- inappropriate
the “theory of its function,” as Justice Anto- ers’ trust, and that “even a perception that future use of
nin Scalia has written, “is that it belongs to Google is acquiescing to the Government’s
no branch of the institutional Government, demands to release its query log would collected tele-
serving as a kind of buffer or referee between harm Google’s business.”148 Though rela- communications
the Government and the people.”144 This tively unmoved by this “business goodwill” metadata will not
“unique role in our criminal justice system” argument, the court sua sponte raised its in-
is intimately related to its broad investigato- dependent concerns about the implications necessarily be
ry powers, which may be exercised in service of the request on the privacy of Google’s us- linked with
of “determining whether or not a crime has ers, and ultimately rejected the demand for
been committed.”145 This function bears even anonymized query logs. While Google’s
improper intent
the greatest resemblance to the most fre- reputational interest did not prove decisive at the acquisition
quent use of National Security Letters—as in blocking the demand for information, it stage.
a tool for exhaustively following-up leads, did provide an important motive for the ju-
typically in order to close off unpromising dicial review that allowed user privacy inter-
avenues of investigation—except that recipi- ests to be weighed against the government’s
ents of grand-jury subpoenas are generally need for information.
not subject to indefinite gag orders barring Contrast the track record of National Se-
disclosure of their own testimony. Trial sub- curity Letters, where in many cases employ-
poenas issued at the discretion of federal ees from major telecommunications firms
prosecutors, by contrast, are bound by more not only failed to object to improper re-
stringent procedural restrictions: they are quests, but were to a substantial degree the
typically tied to a particular criminal offense instigators of the abusive practices.149 In the
that there are grounds for believing has been sample of reported violations surveyed by
or will be committed, and they are meant to the Electronic Frontier Foundation, more
be relatively narrowly calculated to produce than half of those related to NSLs occurred
admissible evidence of that offense.146 because “the private entity receiving the
Perhaps the most important practical NSL either provided more information than
difference, however, is that National Secu- requested or turned over information with-
rity Letters are fundamentally secret tools out receiving a valid legal justification from
whose recipients are, in most cases, indefi- the FBI.”150 In one particularly egregious

21
case, a provider responded to a request for One obvious interest implicated by NSLs
e-mail “header information” with “two CDs seeking information about Internet activities
containing the full content of all e-mails in is that of anonymous speech. The Supreme
the accounts.”151 As EFF concluded: Court has held that “an author’s decision
to remain anonymous, like other decisions
Companies were all too willing to concerning omissions or additions to the
comply with the FBI’s requests, and content of a publication, is an aspect of the
—in many cases—the Bureau read- freedom of speech protected by the First
ily incorporated the over-produced Amendment.”155 The Constitution itself, af-
information into its investigatory ter all, owes its existence in no small part to
databases.152 the pseudonymously-published pamphlets
we now know as The Federalist Papers.
This presents a potentially serious problem, For this reason, a growing number of
because even where the Fourth Amendment courts have found it appropriate to apply
does not protect data against disclosure, gov- heightened standards to civil subpoenas
ernment searches of telecommunications whose purpose is to uncover the identity of
records, in particular, may implicate distinct an anonymous online speaker.156 While the
First Amendment interests. The permanent precise standards employed vary from court
secrecy surrounding National Security Let- to court, common features include a require-
ters—which, again, appear to be used primarily ment of notice (via an intermediary) to the
to obtain information about people who are defendant before his identity is disclosed to
not ultimately found to be engaged in wrong- the plaintiff, some prima facie showing to
doing—means that the recipients will typically establish the strength of the plaintiff’s case,
lack both the information that would be nec- and a judicial balancing of the plaintiff’s in-
essary to determine when a challenge on First terest against the burden on speech entailed
Amendment grounds might be appropriate by disclosure.157
and, as importantly, the incentive to do so. The First Amendment protects not only
the right to speak, but also a corollary “right
Where the Fourth Amendment Meets to receive information and ideas.”158 Thus,
the First Amendment some legal scholars have argued for a paral-
As Justice Powell observed in his majority lel right to read anonymously, which could
opinion in the Keith case, national security similarly be burdened by NSLs targeting
investigations “often reflect a convergence websites hosting controversial content.159
of First and Fourth Amendment values not Here, too, courts have suggested that sub-
In many cases present in cases of ‘ordinary’ crime. Though poenas seeking to reveal the reading habits
employees the investigative duty of the executive may be of a target would be subject to heightened
stronger in such cases, so also is there great- scrutiny.160 The Supreme Court of Colorado
from major tele- er jeopardy to constitutionally protected has extended this logic to impose height-
communications speech.”153 These concerns are far from hy- ened standards, even upon probable-cause
pothetical: in at least one case noted by the search warrants “directed to bookstores, de-
firms not only Inspector General, the FBI initially sought manding information about the reading his-
failed to object a Section 215 order for records, which the tory of customers,” on the grounds that they
to improper FISA court denied on the basis of First “intrude upon the First Amendment rights
Amendment concerns. The Bureau then pro- of customers and bookstores because com-
requests, ceeded to obtain the very same records using pelled disclosure of book-buying records
but were the National Security Letters, even though the threatens to destroy the anonymity upon
NSL statutes are nominally subject to the which many customers depend.”161
instigators of the same First Amendment constraints as Sec- There is no obvious reason to think this
abusive practices. tion 215 orders. 154 logic any less applicable to the Internet than

22
to bookstores—and, indeed, substantial advocacy. The acquisition of the “second National Security
circumstantial evidence that users rely, if degree” transactional records for the list’s e- Letters seem
anything, more heavily on the sense of ano- mail address will not only, in effect, reveal the
nymity the Web provides. For example, 40 full membership list of the group, but is also especially likely
percent of Internet users, by one estimate, likely to provide fairly detailed information to intrude
visit pornographic websites each month.162 about which are the most active participants.
More than a third have visited sites related This is true not only with respect to tradition-
on protected
to sensitive personal issues, such as online al, formally incorporated political entities, domains of
support groups or sites providing infor- but self-organizing ad-hoc groups, which le- religious or
mation about medical conditions.163 The gal scholar Katherine Strandburg has dubbed
willingness of users to seek information on “emergent associations.”166 These kinds of political speech
such sensitive topics will often depend on informal, bottom-up associations may be es- and association.
the belief that they remain anonymous in pecially sensitive to chilling effects, precisely
doing so. because they will often lack the institutional
Finally, the Supreme Court has recog- resources to protect themselves possessed by
nized a First Amendment interest in “ex- more formal, traditional activist entities such
pressive association,” holding in NAACP v. as the NAACP.
Alabama that “immunity from state scrutiny National Security Letters, then, give us
of membership lists” may be necessary to an unfortunate confluence of features. Con-
preserve the “right of the members to pursue firming Justice Powell’s warning, they seem
their lawful private interests privately and to especially likely to intrude on protected do-
associate freely with others in so doing.”164 mains of religious or political speech and
This is, necessarily, an interest that does not association, as they are used in a sweeping
turn on whether a third party entity has effort to preemptively identify the miniscule
access to the data in question. It is also an number of dangerous needles in a largely
interest especially likely to be implicated as benign haystack. The extreme secrecy sur-
government agencies use NSL-derived data rounding them, meanwhile, effectively elim-
for link analysis aimed precisely at inferring inates the practical mechanism by which ju-
group structures from patterns of commu- dicial scrutiny is often brought to bear when
nication. In the context of the War on Terror, those interests are implicated by (intrinsical-
there is ample evidence that the practice of ly narrower) criminal investigations. All of
using NSLs to “follow every lead” is particu- this coincides with massively increased ca-
larly likely to sweep in data about members pabilities to process, share, and indefinitely
of controversial (but peaceful) political and store whatever data is obtained, exacerbat-
religious groups, even if only for the purpose ing the risk that the aggregate information
of establishing the absence of a connection contained in government databases may be
with more dangerous groups that may hold subject to pernicious uses unforeseen—and
superficially similar radical views.165 perhaps unforeseeable—at the time any par-
Obviously, as organizations make use of e- ticular piece of data is acquired.
mail and the Internet to communicate with
and coordinate their membership, requests Recommendations
for telecommunications metadata will often There is little doubt investigators find
tend to reveal such group associations—and NSLs useful and convenient. But given the
when the organization itself is targeted, will risk to core civil-liberties interests posed by
be tantamount to straightforward acquisi- such sweeping and discretionary tools, con-
tion of a membership roster. Suppose, for venience is an inadequate justification. The
example, an NSL “community of interest” secret acquisition, without judicial approval,
request takes as its starting point a member of sensitive records pertaining to presump-
of a group mailing list devoted to political tively innocent Americans should not be

23
countenanced without clear evidence that of a foreign power, the information obtained
it is necessary to the prevention of serious at that stage can be employed to make the
harm to national security, and that any more requisite showing to the FISA court for a
limited authority would be insufficient to Section 215 order seeking more-detailed re-
accomplish this goal. Nothing in the public cords. This structure still grants enormous
record suggests that this burden can be met. flexibility to investigators, permitting ac-
Of the five types of National Security Let- cess to records pursuant to a relatively per-
ters, ECPA NSLs for communications records missive standard, but ensures that records
present the most serious threat to protected implicating core speech and association
privacy interests and civil-liberties interests. interests are not routinely obtained about
The Patriot Act’s expansion of ECPA NSL au- innocent persons without the approval of
thority to investigations designed to protect an independent magistrate. While it may
against international terrorism should be re- be tempting to insist that a court order be
tained, along with the delegation of issuing obtained for all records, this could have the
authority to field offices, assuming ongo- perverse consequence of yielding greater in-
ing centralized review. Its scope should oth- trusion, as agents would have an incentive
erwise be returned to its pre-Patriot limits. to sweep as broadly as possible in a single
The secret ECPA NSLs for “toll records” or their Inter- order—obviating the need for multiple ap-
acquisition of net equivalent should be limited to persons plications—even when more-limited records
sensitive records believed, on the basis of specific facts, to be would suffice.
agents of some foreign power. Any effort to A similar process should obtain for fi-
pertaining to expand their scope from toll records to elec- nancial-record NSLs. That is, they should
presumptively tronic communications transaction records permit investigators to obtain detailed re-
generally should be especially resisted, since cords only for persons believed, on the ba-
innocent the practical implications for privacy inter- sis of specific facts, to be agents of foreign
Americans ests of such broad authority are effectively powers. They may also permit identification
should not be impossible to predict given the speed of tech- of other parties to those transactions—such
nological change. More restricted NSLs, seek- as the recipient of a wire transfer. Records
countenanced ing basic subscriber information, should be of those parties, however, should be acquired
without clear available for persons in direct communica- pursuant to a Section 215 order following a
evidence that it tion with those suspected agents. judicial determination that the records are
This structure properly balances the need relevant. Because full credit reports gener-
is necessary to for investigative flexibility with the privacy ally contain less-sensitive and detailed in-
the prevention of interests of largely innocent parties. It al- formation, and are attended by lesser expec-
lows analysts to determine the identities of tations of privacy, the current standard for
serious harm to persons with whom actual investigative sub- credit report NSLs may be adequate, provid-
national security. jects are in contact, but does not permit the ed future audits confirm they are being used
exposure of potentially sensitive patterns in an appropriately narrow fashion.
of communication and association on the As with Section 215 orders, the gag provi-
basis of any casual link to a single suspect. sions of the NSL statutes should be modified
In combination with evidence obtained by to conform to the ruling in Doe v. Mukasey.167
other investigative means, this should en- The oversight and minimization procedures
able agents to establish which persons re- which the Justice Department has already
quire further scrutiny. agreed to implement on a voluntary basis
If there is some reason to think the re- should similarly be codified in statute to
cords of particular parties in contact with a ensure they are not quietly eroded by the
target are relevant to the investigation, but decisions of future administrations.168 In
there are insufficient grounds for conclud- particular, when an investigation is closed
ing that those parties are themselves agents without further legal or intelligence action

24
being taken, records obtained in the course and Obstruct Terrorism (USA PATRIOT) Act of
2001, Pub. L. No. 107-56, 115 Stat. 272 (2001).
of that investigation should be purged from
FBI databases, by default, after some fixed 2. Editorial, “Stampeded in the House,” Wash-
period of time. There is no legitimate reason ington Post, October 16, 2001.
to indefinitely retain detailed information 3. Pub. L. No. 108-458 and 118 Stat. 3638
about tens of thousands of Americans who §6001. References throughout this paper to “Pa-
are not suspected of involvement in terror triot provisions” or “Patriot authorities” should
or espionage. Notwithstanding any changes, be understood as shorthand encompassing Lone
the myriad problems already identified with Wolf and other changes to surveillance powers
made by subsequent legislation.
the use of National Security Letters, and the
incredible scale of their use, suggests that 4. USA PATRIOT Improvement and Reautho-
this expanded authority should be subject rization Act of 2005, Pub. L. 109-177, 120 Stat.
to a sunset and regular auditing by the In- 192–277 (2006). For further background on the
three sunsetting provisions, see Anna C. Henning
spector General to ensure that they are sub- and Edward C. Liu, “Amendments to the For-
ject to continuing review. eign Intelligence Surveillance Act Set to Expire in
2009,” CRS Report R40138, December 23, 2009.

5. For a more detailed account, see Brian T. Yeh


Conclusion and Charles Doyle, “USA PATRIOT Improvement
and Reauthorization Act of 2005: A Legal Analy-
It has become commonplace over the last sis,” CRS Report RL33332, December 21, 2006.
decade to speak of the need to balance priva-
6. See, for example, House Judicary Committee,
cy and security interests. While it is certainly “Hearing on the USA PATRIOT Act,” September
true that trade-offs between these values are 22, 2009, http://judiciary.house.gov/hearingshe
sometimes inevitable, we should not allow ar_090922.html; and Senate Judiciary Commit-
the metaphor to mislead us into viewing tee “Reauthorizing the USA PATRIOT Act: En-
suring Liberty and Security,” September 23, 2009,
them as inherently conflicting. Often we http://judiciary.senate.gov/hearings/hearing.
can have both. cfm?id=4062.
The reforms proposed in this paper are
guided by that principle: they seek to limit the 7. The most serious abuses are documented in
Office of the Inspector General, “A Review of the
government’s ability to invade the privacy of Federal Bureau of Investigation’s Use of Exigent
innocent Americans without compromising Letters and Other Informal Requests for Tele-
the effectiveness of tools the intelligence com- phone Records,” January 2010, http://www.jus
munity truly requires to detect and apprehend tice.gov/oig/special/s1001r.pdf. For a summary of
earlier findings of improprieties, see David Stout,
terrorists. In the climate of panic and uncer- “F.B.I. Head Admits Mistakes in Use of Security
tainty following the attacks of 9/11—with Act,” New York Times, March 10, 2007, http://www.
no clear understanding of how the attackers nytimes.com/2007/03/10/washington/10fbi.
had gone undetected, how many more might html.
be waiting to strike again, or what methods 8. Hearing on the Report by the Office of the
might prove necessary to detect them—it Inspector General of the Department of Justice
should not be surprising that we erred on the on the Federal Bureau of Investigation’s Use of
side of granting government more power with Exigent Letters and Other Informal Requests for
Telephone Records, April 14, 2010, http://judi
fewer restrictions. Now, with the benefit of a ciary.house.gov/hearings/hear_100414.html.
decade’s experience, we have an opportunity See also the earlier Hearing on: H.R. 3189, the
to do better. “National Security Letters Reform Act of 2007,”
April 10, 2008, http://judiciary.house.gov/hear
ings/hear_041508.html.
Notes 9. See, for example, Charlie Savage, “Battle
1. Uniting and Strengthening America by Pro- Looms Over the Patriot Act,” New York Times,
viding Appropriate Tools Required to Intercept September 20, 2009, http://www.nytimes.com/
2009/09/20/us/politics/20patriot.html.

25
10. For a summary of the main proposals and 18. See “Final Report of the Select Commit-
how they would have differed from current law, tee to Study Governmental Operations with
see the comparison chart produced by the Ameri- Respect to Intelligence Activities,” S. REP. NO.
can Civil Liberties Union, “Comparison Chart,” 94-755 (1976) [hereinafter “Church Committee
September 30, 2009, http://www.aclu.org/image Report”].
s/general/asset_upload_file577_41249.pdf; and
“A Breakdown of the H.R. 3845, The USA PATRI- 19. The letter is available at http://www.wired.
OT Amendments Act of 2009,” October 27, 2009, com/threatlevel/2009/09/obama-backs-expir
http://www.aclu.org/national-security/break ing-patriot-act-spy-provisions/.
down-hr-3845-usa-patriot-amendments-act-
2009. The American Association of Law Libraries’ 20. See, for example, Amy Zegart, Spying Blind:
Issue Brief “USA PATRIOT ACT and PATRIOT The CIA, the FBI, and the Origins of 9/11 (Princeton:
Reauthorization: Section 215,” June 2010, http:// Princeton University Press, 2007).
www.aallnet.org/aallwash/ib082009.pdf, includes
a detailed timeline of reform proposals and legis- 21. Lieu and Henning, above at note 4.
lative action.
22. Patrick Leahy, Charles Grassley, and Arlen
11. Michael B. Farrell, “Obama signs Patriot Specter: “Interim Report on FBI Oversight in the
Act extension without reforms,” Christian Science 107thCongressbytheSenateJudiciaryCommittee:
Monitor, March 1, 2010, http://www.csmonitor. FISA Implementation Failures,” February 2003,
com/USA/Politics/2010/0301/Obama-signs- http://www.fas.org/irp/congress/2003_rpt/
Patriot-Act-extension-without-reforms. fisa.html.

12. David Kravetz, “House Fails to Extend Pa- 23. Ibid. §III(C)(1).
triot Act Spy Powers,” Wired, February 8, 2011,
http://www.wired.com/threatlevel/2011/02/ 24. United States v. U.S. District Court, 407 U.S. 297
patriot-act-notextended/. (1972). Although FISA wiretaps—unlike those
at issue in the Keith case—do involve advance
13. Thomas Ferraro and Phillip Barbara, “Con- judicial approval, the Foreign Intelligence Sur-
gress votes to renew anti-terrorism powers,” Re- veillance Court has acknowledged that because
uters, February 17, 2011, http://www.reuters.com/ surveillance orders under FISA and Title III “di-
article/2011/02/17/us-usa-security-congress verge in constitutionally relevant areas—in par-
-idUSTRE71G47T20110217. ticular, in their probable cause and particularity
showings—a FISA order may not be a ‘warrant’
14. S. 149, “To extend expiring provisions of the contemplated by the Fourth Amendment.” In re:
USA PATRIOT Improvement and Reauthoriza- Sealed Case, 310 F.3d 717 (2002).
tion Act of 2005, the Intelligence Reform and
Terrorism Prevention Act of 2004, and the FISA 25. Id., majority opinion of Justice Powell at
Amendments Act of 2008 until December 31, 309. See also United States v. Truong Dinh Hung,
2013, and for other purposes,” http://www.gov 629 F.2d 908 (4th Cir. 1980), holding that the
track.us/congress/billtext.xpd?bill=s112-149. foreign intelligence exception to the conven-
tional Fourth Amendment warrant requirement
15. Fahima Haque, “GOP Senators Back Per- applies “only when the object of the search or the
manent Extension of Patriot Act,” February 4, surveillance is a foreign power, its agent or col-
2011, http://www.mainjustice.com/2011/02/04/ laborators” because of the enhanced “need for
gop-senators-back-permanent-extension-of- speed, stealth, and secrecy” as well as “difficult
patriot-act/ and subtle judgments about foreign and military
affairs.”
16. Press Release, “Leahy Renews Effort To Extend
Expiring PATRIOT Act Authorities, Increase Over- 26. See Peter P. Swire, “The System of Foreign
sight,” January 26, 2011, http://leahy.senate.gov/ Intelligence Surveillance Law,” 72 Geo. Wash. L.
press/press_releases/release/?id=16e3e765-00e7- Rev. 1306 (2004), section II.
48eb-add7-a64f415e9c1d. For a more detailed
overview of proposals, see Edward C. Liu, “Amend- 27. See letter from Ronald Weich, above at note
ments to the Foreign Intelligence Surveillance Act 17.
(FISA) Set to Expire February 28, 2011,” CRS Re-
port R40138 (February 10, 2011), http://www.fas. 28. See H.R. Rep. No. 1283, Pt. I, 95th Cong., 2d
org/sgp/crs/intel/R40138.pdf; and Charles Doyle, Sess. 1978 U.S.C.C.A.N. 4048 (June 8, 1978) at
National Security Letters: Proposals in the 112th Con- 43.
gress, CRS Report R41619, February 1, 2011.
29. See David S. Kris and J. Douglas Wilson, Na-
17. P.L. 107-56, § 224(b); P.L. 108-458, § 6001(b). tional Security Investigations & Prosecutions (Eagan,

26
MN: Thomson/West, 2007) §8 [hereinafter “Kris 42. United States v. Bianco, 998 F.2d 1112 (2d Cir.
and Wilson”]. 1993), cert. denied, 114 S. Ct. 1644 (1994).

30. Transactional Records Access Clearinghouse, 43. United States. v. Petti, 973 F.2d 1441 (9th Cir.
“Who is a Terrorist,” September 28, 2009, http:// 1992), cert. denied, 113 S. Ct 1859 (1993).
trac.syr.edu/tracreports/terrorism/215/.
44. See Mark Rumold, “Documents Obtained
31. Named for the Omnibus Crime Control and by EFF Reveal FBI Patriot Act Abuses,” Deeplinks
Safe Streets Act of 1968, Title III, Pub. L. 90-351, Blog, March 31, 2011, https://www.eff.org/deep
82 Stat. 212 (June 19, 1968) (codified as amended links/2011/03/documents-obtained-eff-reveal-
at 18 U.S.C. §§2510-22) [hereinafter “Title III”]. fbi-patriot-act.

32. In re All Matters Submitted to the Foreign Intel- 45. See note 31.
ligence Surveillance Court, 218 F. Supp. 2d 611
(2002). 46. “FBI Typo Triggers Errant E-Mail Search,”
The Smoking Gun, December 3, 2010, http://www.
33. Kris and Wilson, §9:4. thesmokinggun.com/documents/fail/fbi-typo-
triggers-errant-e-mail-search.
34. U.S. v. Sattar, 2003 WL 22510435 (S.D. N.Y.
2003). 47. Remarks of Joel M. Margolis at the ISS
World Americas Conference on the panel “Regu-
35. See notes 50–52, below, and accompanying latory and CALEA Issues Facing Telecom Opera-
text. tors Deploying DPI Infrastructure,” October 13,
2009. A link to a recording of the panel by secu-
36. Carrie Johnson, “Director of FBI Urges Re- rity researcher Chris Soghoian is at http://para
newal of Patriot Act,” Washington Post, March 26, noia.dubfire.net/2010/01/who-is-neustar.html.
2009, http://www.washingtonpost.com/wp-dyn/
content/article/2009/03/25/AR2009032501862. 48. For an introduction to DPI technology and
html. analysis of its interaction with surveillance law,
see Paul Ohm ,“The Rise and Fall of Invasive ISP
37. Electronic Communications Privacy Act of Surveillance” University of Illinois Law Review 1417
1986, Pub. L. 99-508, §106(d)(3), codified at 18 (2009), http://ssrn.com/abstract=1261344.
U.S.C. §2581(11). For a more detailed history, see
Peter M. Thompson, “White Paper on The USA 49. See note 42.
PATRIOT Act’s ‘Roving’ Electronic Surveillance
Amendment to the Foreign Intelligence Surveil- 50. See Yeh and Doyle, above at note 5, pp. 16–
lance Act” (Washington: The Federalist Society, 18.
April 2004), http://www.fed-soc.org/publications
/pubID.130/pub_detail.asp. 51. Office of the Inspector General, “The Fed-
eral Bureau of Investigation’s Foreign Language
38. See, for example, James X. Dempsey, “Why Translation Program (Redacted for Public Re-
Section 206 Should Be Modified” in Patriot Debates: lease),” Audit Report 10-02, October 2009, http:
Experts Debate the USA PATRIOT Act, ed. Stewart A. //www.justice.gov/oig/reports/FBI/a1002_re
Baker and John Kavanaugh (Chicago: ABA Pub- dacted.pdf.
lishing, 2005), http://www.abanet.org/natsecurity/
patriotdebates/section-206, which raises many of 52. 18 U.S.C. §2518(8)(d).
the concerns outlined here while agreeing that “It
makes perfect sense that the FBI should have rov- 53. See Kris and Wilson §22:1.
ing tap authority in intelligence investigations of
terrorists.” 54. Id. §27–§30.

39. The “particularity” requirement is meant to 55. The orders could be served on “a common
limit the discretion of officers executing a war- carrier, public accommodation facility, physical
rant. See Maryland v. Garrison, 480 U.S. 79, 84, storage facility, or vehicle rental facility.” Pub. L.
107 S. Ct. 1013, 94 L. Ed. 2d 72 (1987). 105-282, Title II, §215, 112 Stat. 2411 (October
20, 1998); 50 U.S.C. §1672(a) (1998).
40. See Kris and Wilson §6:12.
56. Office of the Inspector General, “A Review of
41. Administrative Office of the United States the Federal Bureau of Investigation’s Use of Sec-
Courts, “Wiretap Report 2009,” April 2010, http: tion 215 Orders for Business Records,” March,
//www.uscourts.gov/Statistics/WiretapReports/ 2007, http://www.usdoj.gov/oig/special/s0703a/
WiretapReport2009.aspx. final.pdf [hereinafter OIG 215 Report I].

27
57. John Doe, Inc. v. Mukasey, 549 F.3d 861 (2d All Fifty States: How To Apply the Fourth
Cir. 2008). Amendment and Its State Analogs To Protect
Third Party Information from Unreasonable
58. 50 U.S.C. §1861(f)(2)(ii). Search,” Cath. U. L. Rev. 55 (2006): 373.

59. 50 U.S.C. §1861(b)(2)(a). 69. See Murdock v. State, 664 P.2d 589, 598 (Alas-
ka Ct. App. 1983) (“[The petitioner] had a rea-
60. Kris and Wilson §18:3. sonable expectation of privacy in the property
stored [in a rented locker] at the YMCA.”); Fer-
61. See Yeh and Doyle, above at note 5, and OIG ris v. State, 640 S.W.2d 636, 638 (Tex. App. 1982)
215 Report I, pp. ii–v. (“Under proper circumstances, a storage locker
is a place entitled to Fourth Amendment . . . pro-
62. Id. note 59. tection.”)
63. See United States v. Miller, 425 U.S. 435 (1976); 70. United States v. Warshak, 631 F.3d 266 (6th
Smith v. Maryland, 442 U.S. 735 (1979). Cir. 2010).
64. 147 Cong. Rec. S10993 (October 25, 2001). 71. In re Application of the U.S. for an Order
Directing a Provider of Elec. Commc’n Serv. to
65. See, for example, “USA PATRIOT Act De- Disclose Records to the Gov’t, 620 F. 3d 304, 319
bate,” PBS NewsHour, PBS, December 13, 2005, (3d Cir. 2010) at 317.
http://www.pbs.org/newshour/bb/congress/
july-dec05/patriot_12-13.html. For a more de- 72. See, for example, Kashmir Hill, “History Sniff-
tailed discussion of differences between these ing: How YouPorn Checks What Other Porn Sites
authorities, see notes 140–150 below and accom- You’ve Visited and Ad Networks Test The Quality
panying text. of Their Data,” Forbes, November 30, 2010, http://
blogs.forbes.com/kashmirhill/2010/11/30/his
66. For a very partial sample, see Daniel Solove, tory-sniffing-how-youporn-checks-what-other-
“The Fourth Amendment, Records, and Privacy,” porn-sites-youve-visited-and-ad-networks-test-
in The Digital Person: Technology and Privacy in the the-quality-of-their-data/.
Information Age (New York: NYU Press, 2004);
Christopher Slobogin, Privacy at Risk: The New 73. See notes 151–64 below and accompanying
Government Surveillance and the Fourth Amendment text.
(Chicago: University of Chicago Press, 2007) pp.
151–64; Gerald G. Ashdown, “The Fourth Amend- 74. 50 U.S.C. 1861(c).
ment and the ‘Legitimate Expectation of Privacy,’”
Vand. L. Rev. 34 (1981): 1289, 1315; Patricia Bel- 75. See OIG 215 Report I at viii. Ironically, the
lia, “Surveillance Law Through Cyberlaw’s Lens,” Justice Department appears to have been more
Geo. Wash. L. Rev. 72 (2004): 1375, http://papers.ss conservative than Congress: the OIG report ex-
rn.com/sol3/papers.cfm?abstract_id=556467; plains that the Office of Legal Counsel initially
Jack M. Balkin, “The Constitution in the National concluded that Section 215 did not override
Surveillance State,” Minn. L. Rev. 93 (2008): 1, 19; separate statutory protections for sensitive edu-
Stephen E. Henderson, “Beyond the (Current) cational and medical records. Only when Con-
Fourth Amendment: Protecting Third-Party In- gress explicitly established heightened standards
formation, Third Parties, and the Rest of Us Too,” for acquisition of such records—apparently be-
Pepp. L. Rev. 34 (2007): 975–76; Susan Freiwald, lieving itself to be raising the level of protection
“First Principles of Communications Privacy,” Stan. afforded them—did OLC authorize their acqui-
Tech. L. Rev. 3 (2007): 46–49, http://stlr.stanford. sition pursuant to this authority. Language in a
edu/pdf/freiwald-first-principles.pdf; Jim Harper, subsequent Inspector General’s report suggests
“Reforming Fourth Amendment Privacy Doc- that Justice Department attorneys remain reluc-
trine,” American University Law Review 58 (June tant to process requests that do not fall within
2008): 5, http://digitalcommons.wcl.american.edu the traditional definition of business records,
/cgi/viewcontent.cgi?article=1045; Matthew Tok- however. See Office of the Inspector General, “A
son, “Automation and the Fourth Amendment,” Review of the FBI’s Use of Section 215 Orders for
Iowa L. Review 96 (2010) 581–647, http://www. Business Records in 2006,” March 2008, http://
uiowa.edu/~ilr/issues/ILR_96-2_Tokson.pdf. www.justice.gov/oig/special/s0803a/final.pdf
[hereafter OIG 215 Report II] at 48.
67. Orin S. Kerr, “The Case for the Third-Party
Doctrine.” 107 Mich. L. Rev. (2009), http://ssrn. 76. In 2005, 141 “combination” orders under
com/abstract=1138128. Section 215 were issued in tandem with “pen
register” orders, which permit monitoring of
68. See Stephen E. Henderson, “Learning from numbers dialed from a target phone, in order to

28
obtain subscriber information about persons in 89. This tripartite scheme is based on the pro-
communication with the primary target. Follow- posal previously approved unanimously by the
ing the 2006 reauthorization, this information Senate, and reintroduced in 2009 by Sen. Russ
can be obtained automatically under the pen reg- Feingold as part of the Judiciously Using Surveil-
ister order alone. lance Tools In Counterterrorism Efforts (JUS-
TICE) Act, http://www.eff.org/files/HEN09874.
77. See Ronald Weich, “FISA Annual Report to pdf.
Congress 2009,” April 30, 2010, http://www.fas.
org/irp/agency/doj/fisa/2009rept.pdf. 90. Doe v. Mukasey, note 56, above.

78. In 2006, the average processing time for ap- 91. 50 U.S.C. §1862(f)(2)(C).
proved Section 215 orders was 147 days—and
even longer for applications ultimately with- 92. Doe v. Mukasey at 47, above at note 56.
drawn. Tellingly, no agents interviewed by the
Inspector General could identify any harm to na- 93. A search by Prof. Peter Swire turned up only
tional security as a result of these delays. OIG 215 two brief mentions of NSLs in newspaper stories
Report II at 43. written prior to 2002. See testimony of Peter P.
Swire before the U.S. Senate Judiciary Commit-
79. Id. at 55. tee’s Subcommittee on the Constitution, “Re-
sponding to the Inspector General’s Findings of
80. OIG 215 Report I at 54. Improper Use of National Security Letters by the
FBI,” April 11, 2007, http://judiciary.senate.gov/
81. See American Library Association, “Resolu- hearings/hearing.cfm?id=2679.
tion on the USA PATRIOT Act and Libraries,”
June 29, 2005, http://www.ala.org/ala/aboutala/ 94. Barton Gellman, “The FBI’s Secret Scrutiny;
offices/oif/statementspols/ifresolutions/usa In Hunt for Terrorists, Bureau Examines Re-
patriotactlibraries.cfm. cords of Ordinary Americans,” Washington Post,
November 6, 2005, http://www.washingtonpost.
82. OIG 215 Report I at 28. com/wp-dyn/content/article/2005/11/05/AR
2005110501366.html.
83. Testimony of Todd Hinnen, House Judicia-
ry Committee Hearing, above at note 6. 95. Statement of Glenn A. Fine Inspector Gen-
eral, U.S. Department of Justice, House Judiciary
84. Statement of Sen. Russ Feingold, Senate Committee Hearing “Misuse of Patriot Act Pow-
Judiciary Committee Hearing, above at note 6, ers: The Inspector General’s Findings of Improp-
http://judiciary.senate.gov/hearings/testimony. er Use of National Security Letters by the FBI,”
cfm?id=4062&wit_id=4083. March 21, 2007, http://judiciary.senate.gov/hear
ings/hearing.cfm?id=2616.
85. Remarks of Sen. Richard Durbin, Senate Ju-
diciary Committee “Executive Business Meeting,” 96. For detailed background see Kris and Wilson
October 1, 2009) http://judiciary.senate.gov/re §19:2; Charles Doyle, National Security Letters in
sources/webcasts/index.cfm?changedate=09-28- Foreign Intelligence Investigations: Legal Background
09&p=all. and Recent Amendments, CRS Report RL33320,
September 8, 2009, www.fas.org/sgp/crs/intel/
86. Remarks of Sen. Russ Feingold, ibid. RL33320.pdf; Swire above at note 25.
87. See Tokson, above at note 64. Note that the 97. 12 U.S.C. §3414.
government has argued successfully—and plausi-
bly—that purely automated filtering of electronic 98. Kris and Wilson §19:2 note 16; see note 105
communications for the purpose of isolating below and accompanying text for examples.
those belonging to a surveillance target does not
constitute “interception” of all filtered communi- 99. 18 U.S.C. §2709.
cations. This argument seems difficult to square
with the premise that persons normally waive 100. See U.S. Department of Justice, Searching
their expectation of privacy in data similarly pro- and Seizing Computers and Obtaining Electronic Evi-
cessed by private entities. See testimony of Donald dence (2009) §3(B), http://www.cybercrime.gov/
M. Kerr Assistant Director, Laboratory Division, ssmanual/03ssma.html#B.1; Kaufman v. Nest Seek-
FBI, Before the U.S. Senate Committee on the Ju- ers, LLC, 2006 WL 2807177, at note 5 (S.D.N.Y.
diciary (September 6, 2000), http://www.loc.gov/ Sept. 26, 2006); Becker v. Toca, 2008 WL 4443050,
law/find/hearings/pdf/00089583263.pdf. at note 4 (E.D. La. September 26, 2008).

88. See Leahy press release, above at note 16. 101. See Ellen Nakashima, “White House pro-

29
posal would ease FBI access to records of Inter- Report III at 54–64.
net activity,” Washington Post, July 29, 2010, http://
www.washingtonpost.com/wp-dyn/content/ 116. OIG NSL Report III at 57.
article/2010/07/28/AR2010072806141.html.
117. Id. at 60.
102. Statement of Glenn A. Fine.
118. OIG NSL Report II at 114.
103. U.S. Department of Justice, “FY 2006 Perfor-
mance and Accountability Report,” http://www. 119. Eric Lichtblau, Bush’s Law: The Remaking of
justice.gov/ag/annualreports/pr2006/2006par. American Justice (New York: Pantheon, 2008) p. 92.
pdf.
120. See Zegart, above note 20, chap. 1; James
104. See Swire, above at note 92. Bamford, The Shadow Factory: The Ultra-Secret NSA
from 9/11 to the Eavesdropping on America (New
105. See Testimony of Lisa Graves, Senate Judi- York: Doubleday, 2008), Book I.
ciary Committee hearing, above at note 6.
121. See Jeff Jonas and Jim Harper, “Effective
106. U.S. Department of Justice, Office of the In- Counterterrorism and the Limited Role of Pre-
spector General, “A Review of the Federal Bureau dictive Data Mining,” Cato Institute Policy Anal-
of Investigation’s Use of National Security Letters,” ysis no. 584, December 11, 2006, http://www.
March 2007, [hereinafter OIG NSL Report I]. cato.org/pub_display.php?pub_id=6784.

107. Kris and Wilson §19:5, summarizing 31 122. See National Research Council, Protecting
U.S.C. §§5312(a)(2) & (c)(1). Individual Privacy in the Struggle Against Terrorists:
A Framework for Program Assessment (Washington:
108. Id. National Academies Press, 2008).

109. See OIG NSL Report I; “A Review of the FBI’s 123. Transactional Records Access Clearing-
Use of National Security Letters: Assessment of house, “As Terrorism Prosecutions Decline, Ex-
Corrective Actions and Examination of NSL Usage tent of Threat Remains Unclear,” May 18, 2010,
in 2006,” March 2008 [hereinafter OIG NSL Re- http://trac.syr.edu/tracreports/terrorism/231/.
port II]; “A Review of the Federal Bureau of Investi-
gation’s Use of Exigent Letters and Other Informal 124. Transactional Records Access Clearinghouse,
Requests for Telephone Records,” January 2010 “National Profile and Enforcement: Trends Over
[hereinafter OIG NSL Report III], http://www.us Time,” 2006, http://trac.syr.edu/tracfbi/newfind
doj.gov/oig/special/index.htm. ings/current/.

110. OIG NSL Report II at 9. NSL requests are 125. See American Civil Liberties Union, “Inter-
counted rather than simply NSLs because a sin- net Archive’s NSL Challenge,” April 29, 2008,
gle physical letter may contain multiple discrete http://www.aclu.org/national-security/internet-
demands for information—and in a few cases, archives-nsl-challenge.
hundreds.
126. OIG NSL Report I at 110.
111. See OIG NSL Report I at xlv. (“Overall, we
found approximately 17 percent more national 127. Ellen Nakashima, “FBI Shows Off Counter-
security letters and 22 percent more national se- terrorism Database,” Washington Post, August 30,
curity letter requests in the case files we examined 2006, http://www.washingtonpost.com/wp-dyn/
in four field offices than were recorded in the content/article/2006/08/29/AR2006082901520.
OGC database. As a result, we believe that the html.
total number of NSL requests issued by the FBI
is significantly higher than the FBI reported.”) 128. See Thom Shanker, “Loophole May Have Aid-
ed Theft of Classified Data,” New York Times, July
112. Id. note 108. 9, 2010, https://www.nytimes.com/2010/07/09/
world/09breach.html.
113. Id. note 76.
129. Electronic Frontier Foundation, “Patterns
114. Remarks of David Kris, Senate Judiciary of Misconduct: FBI Intelligence Violations from
Committee Hearing, above at note 6, http:// 2001–2008” (January 2011), http://www.eff.org/
www.fas.org/irp/congress/2009_hr/patriot2. pages/patterns-misconduct-fbi-intelligence-
html. violations.

115. See OIG NSL Report I at 109; OIG NSL 130. OIG NSL Report I at xxxiii.

30
131. See OIG NSL Report III at 25–44. 156. See Doe v. 2TheMart.com Inc., 140 F. Supp.
2d 1088 (W.D. Wash. 2001); Columbia Ins. Co. v.
132. Id., table 4.3 at 198. Seescandy.com, 185 F.R.D. 573 (N.D. Cal. 1999);
Mobilisa, Inc. v. Doe 1, 170 P.3d 712 (Ariz. Ct. App.
133. Id. at 89–122. 2007); Krinsky v. Doe 6, 72 Cal. Rptr. 3d 231 (Ct.
App. 2008); Doe No. 1 v. Cahill, 884 A.2d 451 (Del.
134. Id. at 45. 2005); Dendrite Int’l, Inc. v. Doe, No. 3, 775 A.2d 756
(N.J. Super. Ct. App. Div. 2001); In re Subpoena Du-
135. Id. at 137–212. ces Tecum to Am. Online, Inc. (In re AOL), 52 Va. Cir.
26 (Cir. Ct. 2000), rev’d on other grounds sub nom.,
136. Id. at 208. Am. Online, Inc. v. Anonymous Publicly Traded Co.,
542 S.E.2d 377 (Va. 2001).
137. Id. at 66.
157. Nathaniel Gleicher, “John Doe Subpoenas:
138. Id. at 151. Toward a Consistent Legal Standard,” Yale L.J.
118 (2008): 320, http://www.yalelawjournal.org/
139. Id. at 122.. the-yale-law-journal/content-pages/john-doe-
subpoenas:-toward-a-consistent-legal-standard/.
140. See generally Ivan Greenberg, The Dangers of
Dissent: The FBI and Civil Liberties Since 1965 (Lan- 158. Stanley v. Georgia 394 U.S. 557 (1969).
ham, MD: Lexington Books, 2010); Athan Theo-
haris, The FBI and American Democracy: A Brief Crit- 159. Julie E. Cohen, “A Right to Read Anony-
ical History (Lawrence, KS: University of Kansas mously: A Closer Look at ‘Copyright Manage-
Press, 2004). ment’ In Cyberspace,” Conn. L. Rev. 28 (1996): 981,
http://ssrn.com/abstract=17990.
141. Church Committee Report, Book II.
160. In re Grand Jury Subpoena to Kramerbooks &
142. See notes 63–64 above and accompanying Afterwords Inc., Med. L. Rptr. 26 (D.D.C. 1998):
text. 1599.
143. Christopher Slobogin, “Subpoenas and Pri- 161. Tattered Cover, Inc. v. City of Thornton, 44 P.3d
vacy,” 54 DePaul L. Rev. 805, 813–14 (2005). 1044, 1054. (Colo. 2002).
144. United States v. Williams, 504 U.S. 36 at 48 162. See David Crary, “Battle Brews as Porn Moves
(1992). into Mainstream,” Breitbart.com, April 1, 2006,
http://www.breitbart.com/article.php?id=D8
145. United States v. R. Enterprises, 498 U.S. 292 GNE P902&show_article=1.
(1991).
163. Press Release, Pew Internet & Am. Life Project,
146. See, for example, United States v. Nixon, 418 Pew Research Ctr., “86% of Internet Users Want
U.S. 683 (1974). to Prohibit Online Companies from Disclosing
Their Personal Information Without Permission,”
147. Gonzales v. Google, Inc., No. 5:06-mc-80006-W August 21, 2000, http://www.pewinternet.org/
(N.D. Cal. Mar. 17, 2006). Press-Releases/2000/86-of-Internet-Users-Want-
to-Prohibit-Online-Companies-From-Disclosing-
148. Id. Their-Personal-Inf.aspx.

149. See OIG NSL Report III, at 14–25. 164. NAACP v. Alabama ex rel. Patterson, 357 U.S.
449, 460–63 (1958).
150. “Patterns of Misconduct,” note 26, above,
at 8. 165. See Linda E. Fisher, “Guilt by Expressive As-
sociation: Political Profiling, Surveillance and
151. Id. the Privacy of Groups,” Ariz. L. Rev. 46 (2004):
621, 625, 662 n.224.
152. Id.
166. Katherine J. Strandburg, “Freedom of Associ-
153. United States v. U.S. District Court, note 23, above. ation in a Networked World: First Amendment
Regulation of Relational Surveillance,” Boston Col-
154. OIG 215 Report II at 65–74. lege L. Rev. 49 (2008): 741, http://works.bepress.
com/katherine_strandburg/15.
155. McIntyre v. Ohio Elections Commission, 514
U.S. 334 (1995). 167. See notes 89–90 and accompanying text.

31
168.
See Press Release, “DOJ To Implement //leahy.senate.gov/press/press_releases/re
Provisions Of Leahy-Authored Patriot Act Re- lease/?id=355bb191-f539-4f78-a6f2-8a49e8
authorization Proposal,” December 9, 2010, http: 5c7c0b.

STUDIES IN THE POLICY ANALYSIS SERIES

Fannie Mae, Freddie Mac, and the Future of Federal Housing Finance
674. 
Policy: A Study of Regulatory Privilege by David Reiss (April 18, 2011)

Bankrupt: Entitlements and the Federal Budget by Michael D. Tanner (March


673. 
28, 2011)

672. The Case for Gridlock by Marcus E. Ethridge (January 27, 2011)

Marriage against the State: Toward a New View of Civil Marriage by Jason
671. 
Kuznicki (January 12, 2011)

Fixing Transit: The Case for Privatization by Randal O’Toole (November 10,
670. 
2010)

Congress Should Account for the Excess Burden of Taxation by Christopher


669. 
J. Conover (October 13, 2010)

Fiscal Policy Report Card on America’s Governors: 2010 by Chris Edwards


668. 
(September 30, 2010)

Budgetary Savings from Military Restraint by Benjamin H. Friedman and


667. 
Christopher Preble (September 23, 2010)

Reforming Indigent Defense: How Free Market Principles Can Help to Fix
666. 
a Broken System by Stephen J. Schulhofer and David D. Friedman (September 1,
2010)

665. The Inefficiency of Clearing Mandates by Craig Pirrong (July 21, 2010)

The DISCLOSE Act, Deliberation, and the First Amendment by John


664. 
Samples (June 28, 2010)

Defining Success: The Case against Rail Transit by Randal O’Toole (March
663. 
24, 2010)

They Spend WHAT? The Real Cost of Public Schools by Adam Schaeffer
662. 
(March 10, 2010)

Das könnte Ihnen auch gefallen